Search results for: recognition and enforcement of foreign judgment
3464 Modern Trends in Foreign Direct Investments in Georgia
Authors: Rusudan Kinkladze, Guguli Kurashvili, Ketevan Chitaladze
Abstract:
Foreign direct investment is a driving force in the development of the interdependent national economies, and the study and analysis of investments is an urgent problem. It is particularly important for transitional economies, such as Georgia, and the study and analysis of investments is an urgent problem. Consequently, the goal of the research is the study and analysis of direct foreign investments in Georgia, and identification and forecasting of modern trends, and covers the period of 2006-2015. The study uses the methods of statistical observation, grouping and analysis, the methods of analytical indicators of time series, trend identification and the predicted values are calculated, as well as various literary and Internet sources relevant to the research. The findings showed that modern investment policy In Georgia is favorable for domestic as well as foreign investors. Georgia is still a net importer of investments. In 2015, the top 10 investing countries was led by Azerbaijan, United Kingdom and Netherlands, and the largest share of FDIs were allocated in the transport and communication sector; the financial sector was the second, followed by the health and social work sector, and the same trend will continue in the future.Keywords: foreign direct investments, methods, statistics, analysis
Procedia PDF Downloads 3313463 The Emerging Global Judicial Ethics: Issues and Problems
Authors: Caroline Foulquier-Expert
Abstract:
In many states around the world, actions to improve judicial ethics are developing significantly through the production of professional standards for judges. The quest to improve the ethics of judges is legitimate. However, as this development tends to be very important at the moment, some risks it presents must be highlighted. Indeed, if the objective of improving Judges’ Ethics is legitimate, it can also lead to banalization of justice, reinforcement of criticism against the judiciary and to broach incidentally the question of the limits of judgment, which is most perilous for the independence of the judiciary. This research, based on case studies, interviews with judges and an analysis of the literature on this topic (mainly from the United States of America and European Union Member States), tends to draw attention to the fact that the result of the development of these professional standards is that the ethical requirements of judges become ethical requirements of justice, which is an undesirable effect of which we must be aware, in order to prevent it.Keywords: judicial ethics, codes of conduct, independence, limits of judgment
Procedia PDF Downloads 3383462 Emotion Recognition Using Artificial Intelligence
Authors: Rahul Mohite, Lahcen Ouarbya
Abstract:
This paper focuses on the interplay between humans and computer systems and the ability of these systems to understand and respond to human emotions, including non-verbal communication. Current emotion recognition systems are based solely on either facial or verbal expressions. The limitation of these systems is that it requires large training data sets. The paper proposes a system for recognizing human emotions that combines both speech and emotion recognition. The system utilizes advanced techniques such as deep learning and image recognition to identify facial expressions and comprehend emotions. The results show that the proposed system, based on the combination of facial expression and speech, outperforms existing ones, which are based solely either on facial or verbal expressions. The proposed system detects human emotion with an accuracy of 86%, whereas the existing systems have an accuracy of 70% using verbal expression only and 76% using facial expression only. In this paper, the increasing significance and demand for facial recognition technology in emotion recognition are also discussed.Keywords: facial reputation, expression reputation, deep gaining knowledge of, photo reputation, facial technology, sign processing, photo type
Procedia PDF Downloads 1213461 Improving Activity Recognition Classification of Repetitious Beginner Swimming Using a 2-Step Peak/Valley Segmentation Method with Smoothing and Resampling for Machine Learning
Authors: Larry Powell, Seth Polsley, Drew Casey, Tracy Hammond
Abstract:
Human activity recognition (HAR) systems have shown positive performance when recognizing repetitive activities like walking, running, and sleeping. Water-based activities are a reasonably new area for activity recognition. However, water-based activity recognition has largely focused on supporting the elite and competitive swimming population, which already has amazing coordination and proper form. Beginner swimmers are not perfect, and activity recognition needs to support the individual motions to help beginners. Activity recognition algorithms are traditionally built around short segments of timed sensor data. Using a time window input can cause performance issues in the machine learning model. The window’s size can be too small or large, requiring careful tuning and precise data segmentation. In this work, we present a method that uses a time window as the initial segmentation, then separates the data based on the change in the sensor value. Our system uses a multi-phase segmentation method that pulls all peaks and valleys for each axis of an accelerometer placed on the swimmer’s lower back. This results in high recognition performance using leave-one-subject-out validation on our study with 20 beginner swimmers, with our model optimized from our final dataset resulting in an F-Score of 0.95.Keywords: time window, peak/valley segmentation, feature extraction, beginner swimming, activity recognition
Procedia PDF Downloads 1233460 Assessment of Causes of Building Collapse in Nigeria
Authors: Olufemi Oyedele
Abstract:
Building collapse (BC) in Nigeria is becoming a regular occurrence, each recording great casualties in the number of lives and materials lost. Building collapse is a situation where building which has been completed and occupied, completed but not occupied or under construction, collapses on its own due to action or inaction of man or due to natural event like earthquake, storm, flooding, tsunami or wildfire. It is different from building demolition. There are various causes of building collapse and each case requires expert judgment to decide the cause of its collapse. Rate of building collapse is a reflection of the level of organization and control of building activities and degree of sophistication of the construction professionals in a country. This study explored the use of case study by examining the causes of six (6) collapsed buildings (CB) across Nigeria. Samples of materials from the sites of the collapsed buildings were taken for testing and analysis, while critical observations were made at the sites to note the conditions of the ground (building base). The study found out that majority of the building collapses in Nigeria were due to poor workmanship, sub-standard building materials, followed by bad building base and poor design. The National Building Code 2006 is not effective due to lack of enforcement and the Physical Development Departments of states and Federal Capital Territory are just mere agents of corruption allowing all types of construction without building approvals.Keywords: building collapse, concrete tests, differential settlement, integrity test, quality control
Procedia PDF Downloads 5353459 A Framework for Chinese Domain-Specific Distant Supervised Named Entity Recognition
Abstract:
The Knowledge Graphs have now become a new form of knowledge representation. However, there is no consensus in regard to a plausible and definition of entities and relationships in the domain-specific knowledge graph. Further, in conjunction with several limitations and deficiencies, various domain-specific entities and relationships recognition approaches are far from perfect. Specifically, named entity recognition in Chinese domain is a critical task for the natural language process applications. However, a bottleneck problem with Chinese named entity recognition in new domains is the lack of annotated data. To address this challenge, a domain distant supervised named entity recognition framework is proposed. The framework is divided into two stages: first, the distant supervised corpus is generated based on the entity linking model of graph attention neural network; secondly, the generated corpus is trained as the input of the distant supervised named entity recognition model to train to obtain named entities. The link model is verified in the ccks2019 entity link corpus, and the F1 value is 2% higher than that of the benchmark method. The re-pre-trained BERT language model is added to the benchmark method, and the results show that it is more suitable for distant supervised named entity recognition tasks. Finally, it is applied in the computer field, and the results show that this framework can obtain domain named entities.Keywords: distant named entity recognition, entity linking, knowledge graph, graph attention neural network
Procedia PDF Downloads 933458 Regulation of the Commercial Credits in the Foreign Exchange Operations
Authors: Marija Vicic
Abstract:
The purpose of commercial credit regulation in an unified way under Law on Foreign Exchange Operations in Republic of Serbia allows an easier state monitoring of credit operations performed by non-professionals on foreign exchange market. By broadly defining the term “commercial credits“, the state (i.e. National Bank of Serbia) is given the authority to monitor the performance of all obligations under commercial contracts in which the obligations are not performed simultaneously. In the first part of the paper, the author analyses the economic gist of commercial credits with the purpose of giving an insight into their special treatment. The author examines the term „commercial credits“ given in Law on foreign exchange operations and the difference between financial credits and irregular commercial credits (exports and imports of goods and services deemed to be commercial credits) is particularly highlighted. In the second part, the author emphasizes the specifics of commercial credit contracts, especially the effects of special requests for the parties to these contracts to notify National Bank of Serbia and specific regulations regarding maturity of obligations under these commercial credits and the assignment and compensation of the said contracts.Keywords: commercial credit, foreign exchange operations, commercial transactions, deferred payment, advance payment, (non) resident
Procedia PDF Downloads 4213457 The Role of Authority's Testimony in Preschoolers' Ownership Judgment: A Study with Conflicting Cues Method
Authors: Zhanxing Li, Liqi Zhu
Abstract:
Authorities often intervene in children’s property conflicts, which may affect young children’s ownership understanding. First possession is a typical rule of ownership judgment. We recruited Chinese preschoolers as subjects and investigated their ownership reasoning regarding first possession, by setting three conditions via a conflicting cues method, in which a third party (mother or peer friend)’s testimony was always opposite to the cue of first possession (authority/non-authority testimony condition), or only the cue of first possession was present (no testimony condition). In Study A, we examined forty-two 3- and 5-year olds’ attribution and justification of ownership. The results showed while 5-year olds gave more support for the first possessor as the owner across three conditions, 3-year olds’ choice for the first possessor had no difference from the non-first possessor in the authority testimony condition. Moreover, 3-year olds tended to justify by reference to what mother said in the authority testimony condition, 5-year olds consistently referred to the first possession in three conditions. In Study B, we added two ownership questions to quantify children’s ability of ownership reasoning with four age groups (n = 32 for the 3-year-olds, n = 33 for the 4-year-olds, n = 27 for the 5-year olds and n = 30 for the adults) to explore the developmental trajectory further. It revealed that while 5-year olds’ performances were similar to the adults’ and always judged the first possessor as owner in three conditions, 3- and 4-year olds’ performed at chance level in the authority testimony condition. The results imply that Chinese young preschooler’s ownership reasoning was susceptible to authority’s testimony. Family authority may play an important role in diluting children’s adherence to ownership principles, which will be helpful for children to learn to share with others.Keywords: authority, ownership judgment, preschoolers, testimony
Procedia PDF Downloads 1903456 The Cross-cultural Adaptation Experience of Foreign Scholars in China
Authors: Jiexiu Chen
Abstract:
This research aims to examine several vital issues relating to the foreign scholars’ cross-cultural adaptation in China, including how they perceive about the adaptation process, what the affecting factors are in the adaptation, and which strategies they will apply to deal with perceived cultural differences. The target population of this research is academics regularly working or long-term visiting in these joint colleges, and semi-structured interviews are used in data collection. Moreover, the theoretical perspectives mainly include Ward’s sociocultural and psychological adaptation theory, Berry’s adaptation strategies and Black and his colleague’s expatriate’s adjustment model. This research offers an in-depth profile as well as theory-based analysis about this unique group, and the results of this research are profound in offering directory suggestions for foreign scholars to facilitate their adaptation in China better and for the Chinese universities to eliminate intercultural obstacles, and optimize the international cooperation programs in China.Keywords: cross-cultural adaptation, foreign scholars, expatriates
Procedia PDF Downloads 4233455 Application of Unmanned Aerial Vehicle in Urban Rail Transit Intelligent Inspection
Authors: Xinglu Nie, Feifei Tang, Chuntao Wei, Zhimin Ruan, Qianhong Zhu
Abstract:
Current method of manual-style inspection can not fully meet the requirement of the urban rail transit security in China. In this paper, an intelligent inspection method using unmanned aerial vehicle (UAV) is utilized. A series of orthophoto of rail transit monitored area was collected by UAV, image correction and registration were operated among multi-phase images, then the change detection was used to detect the changes, judging the engineering activities and human activities that may become potential threats to the security of urban rail. Not only qualitative judgment, but also quantitative judgment of changes in the security control area can be provided by this method, which improves the objectives and efficiency of the patrol results. The No.6 line of Chongqing Municipality was taken as an example to verify the validation of this method.Keywords: rail transit, control of protected areas, intelligent inspection, UAV, change detection
Procedia PDF Downloads 3693454 An Analysis of Digital Forensic Laboratory Development among Malaysia’s Law Enforcement Agencies
Authors: Sarah K. Taylor, Miratun M. Saharuddin, Zabri A. Talib
Abstract:
Cybercrime is on the rise, and yet many Law Enforcement Agencies (LEAs) in Malaysia have no Digital Forensics Laboratory (DFL) to assist them in the attrition and analysis of digital evidence. From the estimated number of 30 LEAs in Malaysia, sadly, only eight of them owned a DFL. All of the DFLs are concentrated in the capital of Malaysia and none at the state level. LEAs are still depending on the national DFL (CyberSecurity Malaysia) even for simple and straightforward cases. A survey was conducted among LEAs in Malaysia owning a DFL to understand their history of establishing the DFL, the challenges that they faced and the significance of the DFL to their case investigation. The results showed that the while some LEAs faced no challenge in establishing a DFL, some of them took seven to 10 years to do so. The reason was due to the difficulty in convincing their management because of the high costs involved. The results also revealed that with the establishment of a DFL, LEAs were better able to get faster forensic result and to meet agency’s timeline expectation. It is also found that LEAs were also able to get more meaningful forensic results on cases that require niche expertise, compared to sending off cases to the national DFL. Other than that, cases are getting more complex, and hence, a continuous stream of budget for equipment and training is inevitable. The result derived from the study is hoped to be used by other LEAs in justifying to their management the benefits of establishing an in-house DFL.Keywords: digital evidence, digital forensics, digital forensics laboratory, law enforcement agency
Procedia PDF Downloads 1763453 Arabic as a Foreign Language in the Curriculum of Higher Education in Nigeria: Problems, Solutions, and Prospects
Authors: Kazeem Oluwatoyin Ajape
Abstract:
The study is concerned with the problem of how to improve the teaching of Arabic as a foreign language in Nigerian Higher Education System. The paper traces the historical background of Arabic education in Nigeria and also outlines the problems facing the language in Nigerian Institutions. It lays down some of the essential foundation work necessary for bringing about systematic and constructive improvements in the Teaching of Arabic as a Foreign Language (TAFL) by giving answers to the following research questions: what is the appropriate medium of instruction in teaching a foreign or second language? What is the position of English language in the teaching and learning of Arabic/Islamic education? What is the relevance of the present curriculum of Arabic /Islamic education in Nigerian institutions to the contemporary society? A survey of the literature indicates that a revolution is currently taking place in FL teaching and that a new approach known as the Communicative Approach (CA), has begun to emerge and influence the teaching of FLs in general, over the last decade or so. Since the CA is currently being adapted to the teaching of most major FLs and since this revolution has not yet had much impact on TAPL, the study explores the possibility of the application of the CA to the teaching of Arabic as a living language and also makes recommendations towards the development of the language in Nigerian Institutions of Higher Learning.Keywords: Arabic Language, foreign language, Nigerian institutions, curriculum, communicative approach
Procedia PDF Downloads 6123452 Chinese Vocabulary Acquisition and Mobile Assisted Language Learning
Authors: Yuqing Sun
Abstract:
Chinese has been regarded as one of the most difficult languages in learning due to its complex spelling structure, difficult pronunciation, as well as its varying forms. Since vocabulary acquisition is the basic process to acquire a language, to express yourself, to compose a sentence, and to conduct a communication, so learning the vocabulary is of great importance. However, the vocabulary contains pronunciation, spelling, recognition and application which may seem as a huge work. This may pose a question for the language teachers (language teachers in China who teach Chinese to the foreign students): How to teach them in an effective way? Traditionally, teachers have no choice but teach it all by themselves, then with the development of technology, they can use computer as a tool to help them (Computer Assisted Language Learning or CALL). Now, they move into the Mobile Assisted Language Learning (MALL) method to guide their teaching, upon which the appraisal is convincing. It diversifies the learning material and the way of output, which can activate learners’ curiosity and accelerate their understanding. This paper will focus on actual case studies occurring in the universities in China of teaching the foreign students to learn Chinese, and the analysis of the utilization of WeChat channel as an example of MALL model to explore the active role of MALL to enhance the effectiveness of Chinese vocabulary acquisition.Keywords: Chinese, vocabulary acquisition, MALL, case
Procedia PDF Downloads 4143451 Understanding Context and Its Effects in the Implementation of Modern Foreign Language Curriculum in Vietnam
Authors: Ngoc T. Bui
Abstract:
The key issue for teachers of a modern foreign language is the creation of a pedagogic environment, and this means that an understanding of context is vital. A pedagogic environment addresses the following: time, feedback, relations with other people, curriculum integration, forms of knowledge, resources and control in the pedagogic relationship. In this light, the multiple case study of the implementation of a modern foreign language curriculum focuses on exploring Vietnamese contexts and participants’ perceptions of factors that may affect their implementation process in order to examine thoroughly how the communicative language teaching (CLT) curriculum is being implemented in second language classrooms. A mixed methods approach is utilized to investigate contextual and personal factors that may affect teachers’ implementation of curriculum and pedagogical reform in Vietnam. This project therefore has the capability to inform stakeholders of useful information and identify further changes and measures to solve potential problems to ensure the achievement of the curriculum goals. The expected outcomes may also lead to intercultural language teaching guidelines to support english as a foreign language (EFL) teachers with curriculum design, planning and how to create pedagogic environment to best implement it.Keywords: communicative language teaching, context, curriculum implementation, modern foreign language, pedagogic environment
Procedia PDF Downloads 2693450 Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups
Authors: Erhan Turgut, Salih Ergün, Abdülkadir Öz
Abstract:
Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-oriented approach, homeland security oriented approach is essential to ensure public support. In this study, terror assumed as a homeland security issue and assigning the law enforcement forces with military status is analyzed.Keywords: terrorism, counter-terrorism, military status law-enforcement, terrorist groups
Procedia PDF Downloads 4613449 Terrorism: Impact on Nigeria’s Foreign Policy, 1999-2015
Authors: Omolaja Akolade Oluwaseunfunmi
Abstract:
This study seeks to ascertain the origin and history of terrorism in Nigeria, determine the causes of terrorism in Nigeria, examine Nigeria’s foreign policies from 1999 to 2015, evaluate how terrorist groups like Boko Haram and the Indigenous People of Biafra (IPOB) have affected Nigeria’s foreign policies in the international arena; ascertain the measures taken by the government in tackling terrorist acts in Nigeria and give recommendations on how to tackle this menace. The methodology used in this research is the analytical method. The study derives its data from both primary and secondary sources. Findings from fieldwork showed that terrorism has also become one of the most important fundamentals of Nigeria’s foreign policies and relations; respondents from the people interviewed showed that terrorism is a menace and that terrorism must be adequately tackled in other to achieve Nigeria’s foreign policy. Furthermore, results revealed that the fight against the scourge has increasingly gained legitimacy and justification among the international community particularly as many countries consider it to be their international obligation to support the global movement to ameliorate or eliminate the menace. In conclusion, this research made, among other recommendations, that the Nigerian government should ensure the provision of a good life for its citizens, the inter-connectivity of terrorist organizations must be defeated, the government should undergo a foreign policy drive designed at rebuilding its image in the international environment, and also the promotion of peace education among various government, religious institutions, private sector, and civil society groups should be encouraged.Keywords: foreign policy, Boko Haram, movement for the emancipation of Niger delta (MEND), terrorism
Procedia PDF Downloads 263448 Make Up Flash: Web Application for the Improvement of Physical Appearance in Images Based on Recognition Methods
Authors: Stefania Arguelles Reyes, Octavio José Salcedo Parra, Alberto Acosta López
Abstract:
This paper presents a web application for the improvement of images through recognition. The web application is based on the analysis of picture-based recognition methods that allow an improvement on the physical appearance of people posting in social networks. The basis relies on the study of tools that can correct or improve some features of the face, with the help of a wide collection of user images taken as reference to build a facial profile. Automatic facial profiling can be achieved with a deeper study of the Object Detection Library. It was possible to improve the initial images with the help of MATLAB and its filtering functions. The user can have a direct interaction with the program and manually adjust his preferences.Keywords: Matlab, make up, recognition methods, web application
Procedia PDF Downloads 1443447 Hand Gesture Recognition for Sign Language: A New Higher Order Fuzzy HMM Approach
Authors: Saad M. Darwish, Magda M. Madbouly, Murad B. Khorsheed
Abstract:
Sign Languages (SL) are the most accomplished forms of gestural communication. Therefore, their automatic analysis is a real challenge, which is interestingly implied to their lexical and syntactic organization levels. Hidden Markov models (HMM’s) have been used prominently and successfully in speech recognition and, more recently, in handwriting recognition. Consequently, they seem ideal for visual recognition of complex, structured hand gestures such as are found in sign language. In this paper, several results concerning static hand gesture recognition using an algorithm based on Type-2 Fuzzy HMM (T2FHMM) are presented. The features used as observables in the training as well as in the recognition phases are based on Singular Value Decomposition (SVD). SVD is an extension of Eigen decomposition to suit non-square matrices to reduce multi attribute hand gesture data to feature vectors. SVD optimally exposes the geometric structure of a matrix. In our approach, we replace the basic HMM arithmetic operators by some adequate Type-2 fuzzy operators that permits us to relax the additive constraint of probability measures. Therefore, T2FHMMs are able to handle both random and fuzzy uncertainties existing universally in the sequential data. Experimental results show that T2FHMMs can effectively handle noise and dialect uncertainties in hand signals besides a better classification performance than the classical HMMs. The recognition rate of the proposed system is 100% for uniform hand images and 86.21% for cluttered hand images.Keywords: hand gesture recognition, hand detection, type-2 fuzzy logic, hidden Markov Model
Procedia PDF Downloads 4623446 Fine Grained Action Recognition of Skateboarding Tricks
Authors: Frederik Calsius, Mirela Popa, Alexia Briassouli
Abstract:
In the field of machine learning, it is common practice to use benchmark datasets to prove the working of a method. The domain of action recognition in videos often uses datasets like Kinet-ics, Something-Something, UCF-101 and HMDB-51 to report results. Considering the properties of the datasets, there are no datasets that focus solely on very short clips (2 to 3 seconds), and on highly-similar fine-grained actions within one specific domain. This paper researches how current state-of-the-art action recognition methods perform on a dataset that consists of highly similar, fine-grained actions. To do so, a dataset of skateboarding tricks was created. The performed analysis highlights both benefits and limitations of state-of-the-art methods, while proposing future research directions in the activity recognition domain. The conducted research shows that the best results are obtained by fusing RGB data with OpenPose data for the Temporal Shift Module.Keywords: activity recognition, fused deep representations, fine-grained dataset, temporal modeling
Procedia PDF Downloads 2313445 Developing an AI-Driven Application for Real-Time Emotion Recognition from Human Vocal Patterns
Authors: Sayor Ajfar Aaron, Mushfiqur Rahman, Sajjat Hossain Abir, Ashif Newaz
Abstract:
This study delves into the development of an artificial intelligence application designed for real-time emotion recognition from human vocal patterns. Utilizing advanced machine learning algorithms, including deep learning and neural networks, the paper highlights both the technical challenges and potential opportunities in accurately interpreting emotional cues from speech. Key findings demonstrate the critical role of diverse training datasets and the impact of ambient noise on recognition accuracy, offering insights into future directions for improving robustness and applicability in real-world scenarios.Keywords: artificial intelligence, convolutional neural network, emotion recognition, vocal patterns
Procedia PDF Downloads 523444 Behavior of Foreign Tourists Visited Wat Phrachetuponwimolmangkalaram
Authors: Pranee Pathomchaiwat
Abstract:
This research aims to study tourism data and behavior of foreign tourists visited Wat Phrachetuponwimolmangkalaram (Wat Po) Sample groups are tourists who visited inside the temple, during February, March, April and May 2013. Tools used in the research are questionnaires constructed by the researcher, and samples are dawn by Convenience sampling. There are 207 foreign tourists who are willing to be respondents. Statistics used are percentage, average mean and standard deviation. The results of the research reveal that: A. General Data of Respondents: The foreign tourists who visited the temple are mostly female (57.5 %), most respondents are aged between 20-29 years (37.2%). Most respondents live in Europe (62.3%), most of them got the Bachelor’s degree (40.1%), British are mostly found (16.4%), respondents who are students are also found (23.2%), and Christian are mostly found (60.9%). B. Tourists’ Behavior While Visiting the Temple Compound: The result shows that the respondents came with family (46.4%), have never visited the temples (40.6%), and visited once (42 %). It is found that the foreign tourists’ inappropriate behavior are wearing revealing attires (58.9%), touching or getting closed to the monks (55.1%), and speaking loudly (46.9%) respectively. The respondents’ outstanding objectives are to visit inside the temple (57.5%), to pay respect to the Reclining Buddha Image in the Viharn (44.4%) and to worship the Buddha image in the Phra Ubosod (37.7%) respectively. C. The Respondents’ Self-evaluation of Performance: It is found that over all tourists evaluated themselves in the highest level averaged 4.40. When focusing on each item, it is shown that they evaluated themselves in the highest level on obeying the temple staff averaged 4.57, and cleanness concern of the temple averaged 4.52, well-behaved performance during the temple visit averaged 4.47 respectively.Keywords: deportment, traveler, foreign tourists, temple
Procedia PDF Downloads 3073443 Sustainable Development as a Part of Development and Foreign Trade in Turkey
Authors: Sadife Güngör, Sevilay Konya
Abstract:
Sustainable development is an economic development scope which covers the economic growth included environmental factors. With the help of economic development, the needs of the future generations are going to be met the needs. As it is aimed the environmental conscious, sustainable development focuses on decreasing the damage of natural sources. From this point of view, while sustainable development is environmentally conscious, it also improving the life standards of individuals. The relationship between development and foreign trade on sustainable development is theoretically searched in this study. In the second part, sustainable development at world and EU is searched and in the last part, the sustainability of trade and development in Turkey is stated.Keywords: development, sustainable development, foreign trade, Turkey
Procedia PDF Downloads 4613442 ChatGPT as a “Foreign Language Teacher”: Attitudes of Tunisian English Language Learners
Authors: Leila Najeh Bel'Kiry
Abstract:
Artificial intelligence (AI) brought about many language robots, with ChatGPT being the most sophisticated thanks to its human-like linguistic capabilities. This aspect raises the idea of using ChatGPT in learning foreign languages. Starting from the premise that positions ChatGPT as a mediator between the language and the leaner, functioning as a “ghost teacher" offering a peaceful and secure learning space, this study aims to explore the attitudes of Tunisian students of English towards ChatGPT as a “Foreign Language Teacher” . Forty-five students, in their third year of fundamental English at Tunisian universities and high institutes, completed a Likert scale questionnaire consisting of thirty-two items and covering various aspects of language (phonology, morphology, syntax, semantics, and pragmatics). A scale ranging from 'Strongly Disagree,' 'Disagree,' 'Undecided,' 'Agree,' to 'Strongly Agree.' is used to assess the attitudes of the participants towards the integration of ChaGPTin learning a foreign language. Results indicate generally positive attitudes towards the reliance on ChatGPT in learning foreign languages, particularly some compounds of language like syntax, phonology, and morphology. However, learners show insecurity towards ChatGPT when it comes to pragmatics and semantics, where the artificial model may fail when dealing with deeper contextual and nuanced language levels.Keywords: artificial language model, attitudes, foreign language learning, ChatGPT, linguistic capabilities, Tunisian English language learners
Procedia PDF Downloads 643441 Myanmar Character Recognition Using Eight Direction Chain Code Frequency Features
Authors: Kyi Pyar Zaw, Zin Mar Kyu
Abstract:
Character recognition is the process of converting a text image file into editable and searchable text file. Feature Extraction is the heart of any character recognition system. The character recognition rate may be low or high depending on the extracted features. In the proposed paper, 25 features for one character are used in character recognition. Basically, there are three steps of character recognition such as character segmentation, feature extraction and classification. In segmentation step, horizontal cropping method is used for line segmentation and vertical cropping method is used for character segmentation. In the Feature extraction step, features are extracted in two ways. The first way is that the 8 features are extracted from the entire input character using eight direction chain code frequency extraction. The second way is that the input character is divided into 16 blocks. For each block, although 8 feature values are obtained through eight-direction chain code frequency extraction method, we define the sum of these 8 feature values as a feature for one block. Therefore, 16 features are extracted from that 16 blocks in the second way. We use the number of holes feature to cluster the similar characters. We can recognize the almost Myanmar common characters with various font sizes by using these features. All these 25 features are used in both training part and testing part. In the classification step, the characters are classified by matching the all features of input character with already trained features of characters.Keywords: chain code frequency, character recognition, feature extraction, features matching, segmentation
Procedia PDF Downloads 3203440 Intelligent Human Pose Recognition Based on EMG Signal Analysis and Machine 3D Model
Authors: Si Chen, Quanhong Jiang
Abstract:
In the increasingly mature posture recognition technology, human movement information is widely used in sports rehabilitation, human-computer interaction, medical health, human posture assessment, and other fields today; this project uses the most original ideas; it is proposed to use the collection equipment for the collection of myoelectric data, reflect the muscle posture change on a degree of freedom through data processing, carry out data-muscle three-dimensional model joint adjustment, and realize basic pose recognition. Based on this, bionic aids or medical rehabilitation equipment can be further developed with the help of robotic arms and cutting-edge technology, which has a bright future and unlimited development space.Keywords: pose recognition, 3D animation, electromyography, machine learning, bionics
Procedia PDF Downloads 793439 The Social Area Disclosure to Reduce Conflicts between Community and the State: A Case of Mahakan Fortress, Bangkok
Authors: Saowapa Phaithayawat
Abstract:
The purposes of this study are 1) to study the over 20-year attempt of Mahakan fort community to negotiate with Bangkok Metropolitan Administration (BMA) to remain in their residential area belonging to the state, and 2) to apply the new social and cultural dimension between the state and the community as an alternative for local participation in keeping their residential area. This is a qualitative research, and the findings reveal that the community claimed their ancestors’ right as owners of this piece of land for over 200 years. The community, therefore, requested to take part in the preservation of land, culture and local intellect and the area management in terms of being a learning resource on the cultural road in Rattanakosin Island. However, BMA imposed the law concerning the community area relocation in Rattanakosin Island. The result of law enforcement led to the failure of the area relocation, and the hard hit on physical structure of the area including the overall deterioration of the cultural road renovated in the year 1982, the 200 years’ celebration of Bangkok. The enforcement of law by the state required the move of the community, and the landscape improvement based on the capital city plan. However, this enforcement resulted in the unending conflicts between the community and the state, and the solution of this problem was unclear. At the same time the community has spent a long time opposing the state’s action, and preparing themselves by administrating the community behind Mahakan fortress with community administrative committee under the suggestion of external organization by registering all community members, providing funds for community administration. At the meantime the state lacked the continuation of the enforcement due to political problem and BMA’s administration problem. It is, therefore, suggested that an alternative solution to this problem lie at the negotiation between the state and the community with the purpose of the collaboration between the two to develop the area under the protective law of each side.Keywords: Pom-Mahakan community, reduction of conflicts, social area disclosure, residential area
Procedia PDF Downloads 3143438 Foreign Direct Investment and its Role in Globalisation
Authors: Gupta Indu
Abstract:
This paper aims to examine the relationship between foreign direct investment and globalization. Foreign direct investment plays an important role in globalization. It is dramatically increasing in the age of globalization. It has played an important role for economic growth in this global process. It can provide new markets and marketing channels, cheaper production facilities, access to new technology, products to a firm. FDI has come to play a major role in the internationalization of business. FDI has become even more important than trade. Growing liberalization of the national regulatory framework governing investment in enterprises and changes in capital markets profound changes have occurred in the size, scope and methods of FDI. New information technology systems, decline in global communication costs have made management of foreign investments far easier than in the past. FDI provide opportunities to host countries to enhance their economic development and opens new opportunities to home countries to optimize their earnings by employing their ideal resources. Smaller and weaker economies can drive out much local competition. For small and medium sized companies, FDI represents an opportunity to become more actively involved in international business activities. In the past decade, foreign direct investment has expanded its role by change in trade policy, investment policy, tariff liberalization, easing of restrictions on foreign investment and acquisition in many nations, and the deregulation and privatization of many industries. In present competitive scenario, FDI has become a prominent external source of finance for developing countries.Keywords: foreign direct investment, globalization, economic development, information technology systems new opportunities
Procedia PDF Downloads 2303437 Smartphone-Based Human Activity Recognition by Machine Learning Methods
Authors: Yanting Cao, Kazumitsu Nawata
Abstract:
As smartphones upgrading, their software and hardware are getting smarter, so the smartphone-based human activity recognition will be described as more refined, complex, and detailed. In this context, we analyzed a set of experimental data obtained by observing and measuring 30 volunteers with six activities of daily living (ADL). Due to the large sample size, especially a 561-feature vector with time and frequency domain variables, cleaning these intractable features and training a proper model becomes extremely challenging. After a series of feature selection and parameters adjustment, a well-performed SVM classifier has been trained.Keywords: smart sensors, human activity recognition, artificial intelligence, SVM
Procedia PDF Downloads 1443436 The Role of the Russian as a Foreign Language (RFL) Textbook in the RFL System
Authors: Linda Torresin
Abstract:
This paper is devoted to the Russian as a Foreign Language (RFL) textbook, which is understood as a fundamental element of the RFL system. The aim of the study is to explore the role of the RFL textbook in modern RFL teaching theories and practices. It is suggested that the RFL textbook is not a secondary factor but contributes to the advancement and rewriting of both RFL theories and practices. This study applies to the RFL textbook theory's recent pedagogical developments in education. Therefore, the RFL system is conceived as a complex adaptive system whose elements (teacher, textbook, students, etc.) interact in a dynamic network of interconnections. In particular, the author shows that the textbook plays a central role in the RFL system since it may change and even renew RFL teaching from both theoretical and practical perspectives. On the one hand, in fact, the use of an RFL textbook may impact teaching theories: that is, the textbook may either consolidate preexisting theories or launch new approaches. On the other hand, the RFL textbook may also influence teaching practices by reinforcing the preexisting ones or encouraging teachers to try new strategies instead. All this allows the RFL textbook, within the RFL complex adaptive system, to exert an influence on the specific teaching contexts in which Russian is taught, interacting with the other elements of the system itself. Through its findings, this paper contributes to the advancement of research on RFL textbook theory.Keywords: adaptive system, foreign language textbook, teaching Russian as a foreign language, textbook of Russian as a foreign language
Procedia PDF Downloads 963435 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology
Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar
Abstract:
The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology
Procedia PDF Downloads 115