Search results for: embedded applications
4797 Deep Learning Based 6D Pose Estimation for Bin-Picking Using 3D Point Clouds
Authors: Hesheng Wang, Haoyu Wang, Chungang Zhuang
Abstract:
Estimating the 6D pose of objects is a core step for robot bin-picking tasks. The problem is that various objects are usually randomly stacked with heavy occlusion in real applications. In this work, we propose a method to regress 6D poses by predicting three points for each object in the 3D point cloud through deep learning. To solve the ambiguity of symmetric pose, we propose a labeling method to help the network converge better. Based on the predicted pose, an iterative method is employed for pose optimization. In real-world experiments, our method outperforms the classical approach in both precision and recall.Keywords: pose estimation, deep learning, point cloud, bin-picking, 3D computer vision
Procedia PDF Downloads 1624796 On the Semantics and Pragmatics of 'Be Able To': Modality and Actualisation
Authors: Benoît Leclercq, Ilse Depraetere
Abstract:
The goal of this presentation is to shed new light on the semantics and pragmatics of be able to. It presents the results of a corpus analysis based on data from the BNC (British National Corpus), and discusses these results in light of a specific stance on the semantics-pragmatics interface taking into account recent developments. Be able to is often discussed in relation to can and could, all of which can be used to express ability. Such an onomasiological approach often results in the identification of usage constraints for each expression. In the case of be able to, it is the formal properties of the modal expression (unlike can and could, be able to has non-finite forms) that are in the foreground, and the modal expression is described as the verb that conveys future ability. Be able to is also argued to expressed actualised ability in the past (I was able/could to open the door). This presentation aims to provide a more accurate pragmatic-semantic profile of be able to, based on extensive data analysis and one that is embedded in a very explicit view on the semantics-pragmatics interface. A random sample of 3000 examples (1000 for each modal verb) extracted from the BNC was analysed to account for the following issues. First, the challenge is to identify the exact semantic range of be able to. The results show that, contrary to general assumption, be able to does not only express ability but it shares most of the root meanings usually associated with the possibility modals can and could. The data reveal that what is called opportunity is, in fact, the most frequent meaning of be able to. Second, attention will be given to the notion of actualisation. It is commonly argued that be able to is the preferred form when the residue actualises: (1) The only reason he was able to do that was because of the restriction (BNC, spoken) (2) It is only through my imaginative shuffling of the aces that we are able to stay ahead of the pack. (BNC, written) Although this notion has been studied in detail within formal semantic approaches, empirical data is crucially lacking and it is unclear whether actualisation constitutes a conventional (and distinguishing) property of be able to. The empirical analysis provides solid evidence that actualisation is indeed a conventional feature of the modal. Furthermore, the dataset reveals that be able to expresses actualised 'opportunities' and not actualised 'abilities'. In the final part of this paper, attention will be given to the theoretical implications of the empirical findings, and in particular to the following paradox: how can the same expression encode both modal meaning (non-factual) and actualisation (factual)? It will be argued that this largely depends on one's conception of the semantics-pragmatics interface, and that this need not be an issue when actualisation (unlike modality) is analysed as a generalised conversational implicature and thus is considered part of the conventional pragmatic layer of be able to.Keywords: Actualisation, Modality, Pragmatics, Semantics
Procedia PDF Downloads 1334795 Experimental Study of Different Types of Concrete in Uniaxial Compression Test
Authors: Khashayar Jafari, Mostafa Jafarian Abyaneh, Vahab Toufigh
Abstract:
Polymer concrete (PC) is a distinct concrete with superior characteristics in comparison to ordinary cement concrete. It has become well-known for its applications in thin overlays, floors and precast components. In this investigation, the mechanical properties of PC with different epoxy resin contents, ordinary cement concrete (OCC) and lightweight concrete (LC) have been studied under uniaxial compression test. The study involves five types of concrete, with each type being tested four times. Their complete elastic-plastic behavior was compared with each other through the measurement of volumetric strain during the tests. According to the results, PC showed higher strength, ductility and energy absorption with respect to OCC and LC.Keywords: polymer concrete, ordinary cement concrete, lightweight concrete, uniaxial compression test, volumetric strain
Procedia PDF Downloads 3954794 Comparing Two Non-Contact Squeeze Film Levitation Designs
Authors: Ahmed Almurshedi, Mark Atherton, Mares Cristinel, Tadeusz Stolarski, Masaaki Miyatake
Abstract:
Transportation and handling of delicate and lightweight objects is a significant issue in some industries. Two levitation prototype designs, a horn transducer design and surface-mounted piezoelectric actuator vibrating plate design, are compared. Both designs are based on the method of squeeze-film levitation (SFL) and the aim of this study is to evaluate the characteristics and performance of each. To this end, physical experiments are conducted and are demonstrated that the horn-type transducer prototype design produces better levitation performance but it design complexity and operating characteristics make it less suitable than the vibrating plate design for practical applications.Keywords: floating, levitation, piezoelectric, squeeze-film, transducer
Procedia PDF Downloads 2794793 Cognitive SATP for Airborne Radar Based on Slow-Time Coding
Authors: Fanqiang Kong, Jindong Zhang, Daiyin Zhu
Abstract:
Space-time adaptive processing (STAP) techniques have been motivated as a key enabling technology for advanced airborne radar applications. In this paper, the notion of cognitive radar is extended to STAP technique, and cognitive STAP is discussed. The principle for improving signal-to-clutter ratio (SCNR) based on slow-time coding is given, and the corresponding optimization algorithm based on cyclic and power-like algorithms is presented. Numerical examples show the effectiveness of the proposed method.Keywords: space-time adaptive processing (STAP), airborne radar, signal-to-clutter ratio, slow-time coding
Procedia PDF Downloads 2734792 The Development of Encrypted Near Field Communication Data Exchange Format Transmission in an NFC Passive Tag for Checking the Genuine Product
Authors: Tanawat Hongthai, Dusit Thanapatay
Abstract:
This paper presents the development of encrypted near field communication (NFC) data exchange format transmission in an NFC passive tag for the feasibility of implementing a genuine product authentication. We propose a research encryption and checking the genuine product into four major categories; concept, infrastructure, development and applications. This result shows the passive NFC-forum Type 2 tag can be configured to be compatible with the NFC data exchange format (NDEF), which can be automatically partially data updated when there is NFC field.Keywords: near field communication, NFC data exchange format, checking the genuine product, encrypted NFC
Procedia PDF Downloads 2814791 Alexa (Machine Learning) in Artificial Intelligence
Authors: Loulwah Bokhari, Jori Nazer, Hala Sultan
Abstract:
Nowadays, artificial intelligence (AI) is used as a foundation for many activities in modern computing applications at home, in vehicles, and in businesses. Many modern machines are built to carry out a specific activity or purpose. This is where the Amazon Alexa application comes in, as it is used as a virtual assistant. The purpose of this paper is to explore the use of Amazon Alexa among people and how it has improved and made simple daily tasks easier for many people. We gave our participants several questions regarding Amazon Alexa and if they had recently used or heard of it, as well as the different tasks it provides and whether it successfully satisfied their needs. Overall, we found that participants who have recently used Alexa have found it to be helpful in their daily tasks.Keywords: artificial intelligence, Echo system, machine learning, feature for feature match
Procedia PDF Downloads 1224790 Influence of Some Technological Parameters on the Content of Voids in Composite during On-Line Consolidation with Filament Winding Technology
Authors: M. Stefanovska, B. Samakoski, S. Risteska, G. Maneski
Abstract:
In this study was performed in situ consolidation of polypropylene matrix/glass reinforced roving by combining heating systems and roll pressing. The commingled roving during hoop winding was winded on a cylindrical mandrel. The work also presents the advances made in the processing of these materials into composites by conventional technique filament winding. Experimental studies were performed with changing parameters – temperature, pressure and speed. Finally, it describes the investigation of the optimal processing conditions that maximize the mechanical properties of the composites. These properties are good enough for composites to be used as engineering materials in many structural applications.Keywords: commingled fiber, consolidation heat, filament winding, voids
Procedia PDF Downloads 2674789 The Cracks Propagation Monitoring of a Cantilever Beam Using Modal Analysis
Authors: Morteza Raki, Abolghasem Zabihollah, Omid Askari
Abstract:
Cantilever beam is a simplified sample of a lot of mechanical components used in a wide range of applications, including many industries such as gas turbine blade. Due to the nature of the operating conditions, beams are subject to variety of damages especially crack propagates. Crack propagation may lead to catastrophic failure during operation. Therefore, online detection of crack presence and its propagation is very important and may reduce possible significant cost of the whole system failure. This paper aims to investigate the effect of cracks presence and crack propagation on one end fixed beam`s vibration. A finite element model will be developed for the blade in which the modal response of the structure with and without crack will be studied.Keywords: blade, crack propagation, health monitoring, modal analysis
Procedia PDF Downloads 3484788 Thermal Technologies Applications for Soil Remediation
Authors: A. de Folly d’Auris, R. Bagatin, P. Filtri
Abstract:
This paper discusses the importance of having a good initial characterization of soil samples when thermal desorption has to be applied to polluted soils for the removal of contaminants. Particular attention has to be devoted on the desorption kinetics of the samples to identify the gases evolved during the heating, and contaminant degradation pathways. In this study, two samples coming from different points of the same contaminated site were considered. The samples are much different from each other. Moreover, the presence of high initial quantity of heavy hydrocarbons strongly affected the performance of thermal desorption, resulting in formation of dangerous intermediates. Analytical techniques such TGA (Thermogravimetric Analysis), DSC (Differential Scanning Calorimetry) and GC-MS (Gas Chromatography-Mass) provided a good support to give correct indication for field application.Keywords: desorption kinetics, hydrocarbons, thermal desorption, thermogravimetric measurements
Procedia PDF Downloads 2984787 Promoting Diversity and Equity through Interdisciplinary Leadership Training
Authors: Sharon Milberger, Jane Turner, Denise White-Perkins
Abstract:
Michigan shares the overall U.S. national need for more highly qualified professionals who have knowledge and experience in the use of evidence-based practices to meet the special health care needs of children, adolescents, and adults with neurodevelopmental disabilities including autism spectrum disorder (DD/ASD). The Michigan Leadership Education in Neurodevelopmental Disabilities (MI-LEND) program is a consortium of six universities that spans the state of Michigan and serves more than 181,800 undergraduate, graduate, and professional students. The purpose of the MI LEND program is to improve the health of infants, children and adolescents with disabilities in Michigan by training individuals from different disciplines to assume leadership roles in their respective fields and work across disciplines. The MI-LEND program integrates “L.I.F.E.” perspectives into all training components. L.I.F.E. is an acronym for Leadership, Interdisciplinary, Family-Centered and Equity perspectives. This paper will describe how L.I.F.E. perspectives are embedded into all aspects of the MI-LEND training program including the application process, didactic training, community and clinical experiences, discussions, journaling and projects. Specific curriculum components will be described including content from a training module dedicated to Equity. Upon completion of the Equity module, trainees are expected to be able to: 1) Use a population health framework to identify key social determinants impacting families and children; 2) Explain how addressing bias and providing culturally appropriate linguistic care/services can influence patient/client health and wellbeing; and 3) Describe the impact of policy and structural/institutional factors influencing care and services for children with DD/ASD and their families. Each trainee completes two self-assessments: the Cultural and Linguistic Competence Health Practitioner Assessment and the other assessing social attitudes/implicit bias. Trainees also conduct interviews with a family with a child with DD/ASD. In addition, interdisciplinary Equity-related group activities are incorporated into face-to-face training sessions. Each MI-LEND trainee has multiple ongoing opportunities for self-reflection through discussion and journaling and completion of a L.I.F.E. project as a culminating component of the program. The poster will also discuss the challenges related to teaching and measuring successful outcomes related to diversity/equity perspectives.Keywords: disability, diversity, equity, training
Procedia PDF Downloads 1664786 Design and Control of a Brake-by-Wire System Using a Permanent Magnet Synchronous Motor
Authors: Daniel S. Gamba, Marc Sánchez, Javier Pérez, Juan J. Castillo, Juan A. Cabrera
Abstract:
The conventional hydraulic braking system operates through the activation of a master cylinder and solenoid valves that distribute and regulate brake fluid flow, adjusting the pressure at each wheel to prevent locking during sudden braking. However, in recent years, there has been a significant increase in the integration of electronic units into various vehicle control systems. In this context, one of the technologies most recently researched is the Brake-by-wire system, which combines electronic, hydraulic, and mechanical technologies to manage braking. This proposal introduces the design and control of a Brake-by-wire system, which will be part of a fully electric and teleoperated vehicle. This vehicle will have independent four-wheel drive, braking, and steering systems. The vehicle will be operated by embedded controllers programmed into a Speedgoat test system, which allows programming through Simulink and real-time capabilities. The braking system comprises all mechanical and electrical components, a vehicle control unit (VCU), and an electronic control unit (ECU). The mechanical and electrical components include a permanent magnet synchronous motor from Odrive and its inverter, the mechanical transmission system responsible for converting torque into pressure, and the hydraulic system that transmits this pressure to the brake caliper. The VCU is responsible for controlling the pressure and communicates with the other components through the CAN protocol, minimizing response times. The ECU, in turn, transmits the information obtained by a sensor installed in the caliper to the central computer, enabling the control loop to continuously regulate pressure by controlling the motor's speed and current. To achieve this, tree controllers are used, operating in a nested configuration for effective control. Since the computer allows programming in Simulink, a digital model of the braking system has been developed in Simscape, which makes it possible to reproduce different operating conditions, faithfully simulate the performance of alternative brake control systems, and compare the results with data obtained in various real tests. These tests involve evaluating the system's response to sinusoidal and square wave inputs at different frequencies, with the results compared to those obtained from conventional braking systems.Keywords: braking, CAN protocol, permanent magnet motor, pressure control
Procedia PDF Downloads 244785 Characterization of Onboard Reliable Error Correction Code for SDRAM Controller
Authors: Pitcheswara Rao Nelapati
Abstract:
In the process of conveying the information there may be a chance of signal being corrupted which leads to the erroneous bits in the message. The message may consist of single, double and multiple bit errors. In high-reliability applications, memory can sustain multiple soft errors due to single or multiple event upsets caused by environmental factors. The traditional hamming code with SEC-DED capability cannot be address these types of errors. It is possible to use powerful non-binary BCH code such as Reed-Solomon code to address multiple errors. However, it could take at least a couple dozen cycles of latency to complete first correction and run at a relatively slow speed. In order to overcome this drawback i.e., to increase speed and latency we are using reed-Muller code.Keywords: SEC-DED, BCH code, Reed-Solomon code, Reed-Muller code
Procedia PDF Downloads 4314784 'Sex, Work and Sex-Work': The Clandestine Tale of a Tabooed Industry in Bangladesh
Authors: Parvez Sattar
Abstract:
There are around 150,000 female sex workers in Bangladesh, and the country hosts one of the largest brothels in the world. There are 20 brothel-villages in the country, of which 14 are recognized to be ‘official’, and at least 11 are currently operational. Although the national Constitution adopts a preventive policy against prostitution, law does not, as such, prohibit commercial sex work by an adult woman working in a brothel having made an affidavit in this regard. But, at the same time, the law renders at least some forms of floating and hotel based sex work illegal, while sex between males has been termed as sodomy and made culpable offence even on its own. All forms of sex works by MSM and Hijra are thus branded as criminal acts. Observations and findings drawn in this article are based on both primary and secondary sources collecting data from a series of field-based empirical studies conducted by the author through questionnaire survey, FGDs, key informant consultations and other PRA/PLA tools. General and specific conclusions have been based on analysis guided by international standards of human and labour rights approaches. It has been noted that neither the community attitudes nor the cultural mind-sets, or the State's institutional set up is supportive of the causes of sex workers engaged in the most exploitative forms of labour. Lack of respect for fundamental rights continues to diminish any chances of sex workers' reintegration to the mainstream of the society, perpetuates poverty, and increases their vulnerability to HIV/AIDS. To aggravate the scenario, the endemic practice of a complex debt-bondage masked by the so-called 'entry-cost' and ‘legal license’ to the industry is considered to be a somewhat accepted 'open secret' and that the police and administration keep their eyes off from such practices treating these as 'their internal affairs'. Often these practices are used by the Sardarni/Khala (landlady) and other 'managing' actors as the tool for further exploitation of the sex workers as well as a 'control strategy'. The paper concludes with the observation that the tabooed truths of commercial sex and sex workers are inherently embedded in the very factors that compel them into this endemically ostracised profession itself. While denial of both recognition and enjoyment of the fundamental human rights of sex workers is widespread, it is the same cycle of social vulnerability and economic exclusion that often confines these people within a continuous process of servitude and modern day slavery.Keywords: commercial sex work and human rights, Labor protection in sex industry, Prostitution Law in Bangladesh, Sex work as modern day slavery
Procedia PDF Downloads 1104783 The Effectiveness of an Injury Prevention Workshop in Increasing Knowledge and Understanding in Grass-Root Youth Coaches
Authors: Mark De Ste Croix, Jonathan Hughes, Francisco Ayala, Michal Lehnert
Abstract:
There are well-known challenges to implementing injury prevention training for youth players but no data are available on the knowledge and understanding of deliverers of such programmes at grass root level. To increase adoption and adherence to such programmes coach knowledge and understanding of injury risk and prevention is essential. Therefore, the purpose of this study was to examine grass-root coaches knowledge and understanding of injury risk and prevention in youth players. 68 grass root coaches (18 females and 50 males) who were attending a one-day injury prevention workshop completed a modified validated questionnaire exploring knowledge and understanding of injury risk and prevention in youth players. Only 59% of coaches agreed that youth players are at a high risk of suffering an injury. There were high levels of agreement that injuries can have negative impacts on team performance (75%) and can cause physical problems in later life (85%), however only around half of coaches felt that injuries affect youth players current quality of life (59%). There was strong agreement that it is possible to prevent injuries in youth players (84%), but coaches were generally unaware of programs to help prevent injuries (84%), and only 9% used some form of injury prevention program. Despite this, nearly all coaches felt that their coaching could benefit from a greater understanding of growth and maturation (91%), injury prevention programmes (91%) and specific exercises (93%) for youth athletes. 17% of coaches rated their knowledge of injury prevention as good/very good at the start of the workshop and this increased to 94% at the end of the workshop. 62% of coaches identified their attitude towards injury prevention as indifferent at the start of the workshop compared with only 1% at the end. Only 14% of coaches at the start of the workshop were confident to deliver an injury prevention session but 83% stated they were confident by the end of the workshop. Finally, 98% of coaches felt that the workshop provided them with the confidence and the knowledge to deliver an injury prevention session and 98% suggested that they would implement injury prevention into their coaching. These data suggest that there is a lack of understanding of grass root coaches that children are a high-risk group for injuries, and that such injuries impact on current quality of life. Despite understanding that injuries can be prevented most grass root coaches do not have the knowledge to implement injury prevention into their coaching and very few do. There is a common consensus amongst these coaches that a greater understanding of such programmes will enhance their coaching. The injury prevention workshop appears to have increased the knowledge and changed the attitude of coaches towards injury prevention. All coaches felt that the workshop provided them with the tools to adopt, implement and deliver injury prevention in their coaching. These data highlight that there is a clear need for education regarding injury risk and prevention to be embedded within the coach education pathway, especially at grass root level.Keywords: coach education, injury prevention, knowledge, and understanding, youth
Procedia PDF Downloads 1714782 Ionic Liquids as Corrosion Inhibitors in CO2 Capture Systems
Abstract:
We present the viability of using thermally stable, practically non-volatile ionic liquids as corrosion inhibitors in aqueous monoethanolamine system. Carbon steel 1020, which widely used as construction material in CO2 capture plants, has been taken as a test material. Corrosion inhibition capacities of typical room-temperature ionic liquids constituting imidazolium cation in concentration range ≤ 3% by weight in CO2 capture applications were investigated. Electrochemical corrosion experiments using the potentiodynamic polarization technique for measuring corrosion current were carried out. The results show that ionic liquids possess ability to suppressing severe operational problems of corrosion in typical CO2 capture plants.Keywords: carbon dioxide, carbon steel, monoethanolamine, corrosion rate, ionic liquids, tafel fit
Procedia PDF Downloads 3264781 Evaluation of SDS (Software Defined Storage) Controller (CorpHD) for Various Storage Demands
Authors: Shreya Bokare, Sanjay Pawar, Shika Nema
Abstract:
Growth in cloud applications is generating the tremendous amount of data, building load on traditional storage management systems. Software Defined Storage (SDS) is a new storage management concept becoming popular to handle this large amount of data. CoprHD is one of the open source SDS controller, available for experimentation and development in the storage industry. In this paper, the storage management techniques provided by CoprHD to manage heterogeneous storage platforms are experimented and analyzed. Various storage management parameters such as time to provision, storage capacity measurement, and heterogeneity are experimentally evaluated along with the theoretical expression to prove the completeness of CoprHD controller for storage management.Keywords: software defined storage, SDS, CoprHD, open source, SMI-S simulator, clarion, Symmetrix
Procedia PDF Downloads 3134780 Positive Outcomes of Internship for Students Majoring in Mathematics
Authors: Irina Peterburgsky
Abstract:
We have been working on finding internship positions for our math and computer science majors. Among many other positive outcomes of internship for students majoring in mathematics, there are: students see new applications of mathematics to real life and see new scientific problems; they learn new methods, tools, etc. that they have not seen in their classes; they appreciate the power of mathematics that increases their interest in learning mathematics; they make decisions to take more advanced math courses; students understand better what their potentials, strong points, and limitations are; learn what work ethic is; learn how to work as a member of a team at a workplace; understand better how to offer their help and how to ask for help; start building their professional relationship; build self-confidence as young professionals, and what is the most important - they get a better understanding of their goals in their future professional careers.Keywords: internship, mathematics, positive outcoms for students, workplace
Procedia PDF Downloads 1824779 Internet Protocol Television: A Research Study of Undergraduate Students Analyze the Effects
Authors: Sabri Serkan Gulluoglu
Abstract:
The study is aimed at examining the effects of internet marketing with IPTV on human beings. Internet marketing with IPTV is emerging as an integral part of business strategies in today’s technologically advanced world and the business activities all over the world are influences with the emergence of this modern marketing tool. As the population of the Internet and on-line users’ increases, new research issues have arisen concerning the demographics and psychographics of the on-line user and the opportunities for a product or service. In recent years, we have seen a tendency of various services converging to the ubiquitous Internet Protocol based networks. Besides traditional Internet applications such as web browsing, email, file transferring, and so forth, new applications have been developed to replace old communication networks. IPTV is one of the solutions. In the future, we expect a single network, the IP network, to provide services that have been carried by different networks today. For finding some important effects of a video based technology market web site on internet, we determine to apply a questionnaire on university students. Recently some researches shows that in Turkey the age of people 20 to 24 use internet when they buy some electronic devices such as cell phones, computers, etc. In questionnaire there are ten categorized questions to evaluate the effects of IPTV when shopping. There were selected 30 students who are filling the question form after watching an IPTV channel video for 10 minutes. This sample IPTV channel is “buy.com”, it look like an e-commerce site with an integrated IPTV channel on. The questionnaire for the survey is constructed by using the Likert scale that is a bipolar scaling method used to measure either positive or negative response to a statement (Likert, R) it is a common system that is used is the surveys. By following the Likert Scale “the respondents are asked to indicate their degree of agreement with the statement or any kind of subjective or objective evaluation of the statement. Traditionally a five-point scale is used under this methodology”. For this study also the five point scale system is used and the respondents were asked to express their opinions about the given statement by picking the answer from the given 5 options: “Strongly disagree, Disagree, Neither agree Nor disagree, Agree and Strongly agree”. These points were also rates from 1-5 (Strongly disagree, Disagree, Neither disagree Nor agree, Agree, Strongly agree). On the basis of the data gathered from the questionnaire some results are drawn in order to get the figures and graphical representation of the study results that can demonstrate the outcomes of the research clearly.Keywords: IPTV, internet marketing, online, e-commerce, video based technology
Procedia PDF Downloads 2424778 Performance Analysis of Photovoltaic Solar Energy Systems
Authors: Zakariyya Hassan Abdullahi, Zainab Suleiman Abdullahi, Nuhu Alhaji Muhammad
Abstract:
In this paper, a thorough review of photovoltaic and photovoltaic thermal systems is done on the basis of its performance based on electrical as well as thermal output. Photovoltaic systems are classified according to their use, i.e., electricity production, and thermal, Photovoltaic systems behave in an extraordinary and useful way, they react to light by transforming part of it into electricity useful way and unique, since photovoltaic and thermal applications along with the electricity production. The application of various photovoltaic systems is also discussed in detail. The performance analysis including all aspects, e.g., electrical, thermal, energy, and energy efficiency are also discussed. A case study for PV and PV/T system based on energetic analysis is presented.Keywords: photovoltaic, renewable, performance, efficiency, energy
Procedia PDF Downloads 5174777 A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases
Authors: Minjung Park, Sangmi Chai, Myoung Jun Lee
Abstract:
Since there are growing concerns on online privacy, enterprises could involve various personal privacy infringements cases resulting legal causations. For companies that are involving online business, it is important for them to pay extra attentions to protect users’ privacy. If firms can aware consequences from possible online privacy invasion cases, they can more actively prevent future online privacy infringements. This study attempts to predict the probability of ruling types caused by various invasion cases under U.S Personal Privacy Act. More specifically, this research explores online privacy invasion cases which was sentenced guilty to identify types of criminal punishments such as penalty, imprisonment, probation as well as compensation in civil cases. Based on the 853 U.S judicial cases ranged from January, 2000 to May, 2016, which related on data privacy, this research examines the relationship between personal information infringements cases and adjudications. Upon analysis results of 41,724 words extracted from 853 regal cases, this study examined online users’ privacy invasion cases to predict the probability of conviction for a firm as an offender in both of criminal and civil law. This research specifically examines that a cause of privacy infringements and a judgment type, whether it leads a civil or criminal liability, from U.S court. This study applies network text analysis (NTA) for data analysis, which is regarded as a useful method to discover embedded social trends within texts. According to our research results, certain online privacy infringement cases caused by online spamming and adware have a high possibility that firms are liable in the case. Our research results provide meaningful insights to academia as well as industry. First, our study is providing a new insight by applying Big Data analytics to legal cases so that it can predict the cause of invasions and legal consequences. Since there are few researches applying big data analytics in the domain of law, specifically in online privacy, this study suggests new area that future studies can explore. Secondly, this study reflects social influences, such as a development of privacy invasion technologies and changes of users’ level of awareness of online privacy on judicial cases analysis by adopting NTA method. Our research results indicate that firms need to improve technical and managerial systems to protect users’ online privacy to avoid negative legal consequences.Keywords: network text analysis, online privacy invasions, personal information infringements, predicting judgements
Procedia PDF Downloads 2294776 Sexual Diversity Training for Hong Kong Teachers Preliminary Themes Identified from Qualitative Interviews
Authors: Diana K. Kwok
Abstract:
Despite the fact that Hong Kong government aims to develop an inclusive society, sexual minority students continue to encounter sexual prejudice without legal protection. They also have difficulties accessing relevant services from mental health and educational professionals, who do not receive systematic training to work with sexual minority students. Informed by the literature on sexual prejudice, heterosexual hegemony, genderism, as well as code of practice for frontline practitioners, the authors explored self-perceived knowledge of teachers and sexual minorities on sexuality and sexual prejudice, and how they perceive prejudice towards sexual minorities in Chinese cultural context. Semi-structure qualitative interviews were carried out with 31 school personnel informants (school teachers and counseling team members) and 25 sexual minority informants on their understanding of sexuality knowledge, their perception of sexual prejudice within school context in Hong Kong, as well as their suggested themes on teachers training on sexual prejudice reduction. This presentation specifically focuses on transcripts from sexual minority informants. Data analysis was carried out through NVivo, and followed the procedures spelt out in the qualitative research literature. Trustworthiness of the study was addressed through various strategies. Preliminary themes emerged from transcript content analysis: 1) A gap of knowledge between sexual minority informants and teachers; 2) Perception on sexual prejudice within cultural context; 3) Heterosexual hegemony and genderism within school system; 4) Needs for mandatory training: contents and strategies. The sexual minority informants found that teachers they encountered were predominantly adopted concepts of binary sex and dichotomous gender. Informants also indicated that the teachings of Confucianism cultural values, religiosity in Hong Kong might well be important cultural forces contributing to sexual prejudice manifested in school context. Although human rights and social justice concepts were embedded in professional code of practice of teachers and school helping professionals, informants found that teachers they encountered may face a dilemma when supporting sexual minority students navigating heterosexual hegemony and genderism in, as a consequence of their personal, institutional, cultural and religious backgrounds. Acknowledgments: The sexual prejudice project was funded by the Hong Kong Research Grant Council (ECS28401614), 2015 to 2017.Keywords: sexual prejudice, Chinese teachers, Chinese sexual minorities, teacher training
Procedia PDF Downloads 2844775 A Non-Invasive Blood Glucose Monitoring System Using near-Infrared Spectroscopy with Remote Data Logging
Authors: Bodhayan Nandi, Shubhajit Roy Chowdhury
Abstract:
This paper presents the development of a portable blood glucose monitoring device based on Near-Infrared Spectroscopy. The system supports Internet connectivity through WiFi and uploads the time series data of glucose concentration of patients to a server. In addition, the server is given sufficient intelligence to predict the future pathophysiological state of a patient given the current and past pathophysiological data. This will enable to prognosticate the approaching critical condition of the patient much before the critical condition actually occurs.The server hosts web applications to allow authorized users to monitor the data remotely.Keywords: non invasive, blood glucose concentration, microcontroller, IoT, application server, database server
Procedia PDF Downloads 2234774 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 1684773 Optical Diagnostics of Corona Discharge by Laser Interferometry
Authors: N. Bendimerad, M. Lemerini, A. Guen
Abstract:
In this work, we propose to determine the density of neutral particles of an electric discharge peak - Plan types performed in air at atmospheric pressure by applying a technique based on laser interferometry. The experimental methods used so far as the shadowgraph or stereoscopy, give rather qualitative results with regard to the determination of the neutral density. The neutral rotational temperature has been subject of several studies but direct measurements of kinetic temperature are rare. The aim of our work is to determine quantitatively and experimentally depopulation with a Mach-Zehnder type interferometer. This purely optical appearance of the discharge is important when looking to know the refractive index of any gas for any physicochemical applications.Keywords: laser source, Mach-Zehnder interferometer, refractive index, corona discharge
Procedia PDF Downloads 4504772 Support Services in Open and Distance Education: An Integrated Model of Open Universities
Authors: Evrim Genc Kumtepe, Elif Toprak, Aylin Ozturk, Gamze Tuna, Hakan Kilinc, Irem Aydin Menderis
Abstract:
Support services are very significant elements for all educational institutions in general; however, for distance learners, these services are more essential than traditional (face-to-face) counterparts. One of the most important reasons for this is that learners and instructors do not share the same physical environment and that distance learning settings generally require intrapersonal interactions rather than interpersonal ones. Some learners in distance learning programs feel isolated. Furthermore, some fail to feel a sense of belonging to the institution because of lack of self-management skills, lack of motivation levels, and the need of being socialized, so that they are more likely to fail or drop out of an online class. In order to overcome all these problems, support services have emerged as a critical element for an effective and sustainable distance education system. Within the context of distance education support services, it is natural to include technology-based and web-based services and also the related materials. Moreover, institutions in education sector are expected to use information and communication technologies effectively in order to be successful in educational activities and programs. In terms of the sustainability of the system, an institution should provide distance education services through ICT enabled processes to support all stakeholders in the system, particularly distance learners. In this study, it is envisaged to develop a model based on the current support services literature in the field of open and distance learning and the applications of the distance higher education institutions. Specifically, content analysis technique is used to evaluate the existing literature in the distance education support services, the information published on websites, and applications of distance higher education institutions across the world. A total of 60 institutions met the inclusion criteria which are language option (English) and availability of materials in the websites. The six field experts contributed to brainstorming process to develop and extract codes for the coding scheme. During the coding process, these preset and emergent codes are used to conduct analyses. Two coders independently reviewed and coded each assigned website to ensure that all coders are interpreting the data the same way and to establish inter-coder reliability. Once each web page is included in descriptive and relational analysis, a model of support services is developed by examining the generated codes and themes. It is believed that such a model would serve as a quality guide for future institutions, as well as the current ones.Keywords: support services, open education, distance learning, support model
Procedia PDF Downloads 2034771 Electronic, Magnetic and Optic Properties in Halide Perovskites CsPbX3 (X= F, Cl, I)
Authors: B. Bouadjemi, S. Bentata, T. Lantri, Souidi Amel, W.Bensaali, A. Zitouni, Z. Aziz
Abstract:
We performed first-principle calculations, the full-potential linearized augmented plane wave (FP-LAPW) method is used to calculate structural, optoelectronic and magnetic properties of cubic halide perovskites CsPbX3 (X= F,I). We employed for this study the GGA approach and for exchange is modeled using the modified Becke-Johnson (mBJ) potential to predicting the accurate band gap of these materials. The optical properties (namely: the real and imaginary parts of dielectric functions, optical conductivities and absorption coefficient absorption make this halide perovskites promising materials for solar cells applications.Keywords: halide perovskites, mBJ, solar cells, FP-LAPW, optoelectronic properties, absorption coefficient
Procedia PDF Downloads 3244770 High Power Low Loss CMOS SPDT Antenna Switch for LTE-A Front End Module
Authors: Ki-Jin Kim, Suk-Hui LEE, Sanghoon Park, K. H. Ahn
Abstract:
A high power, low loss asymmetric single pole double through(SPDT) antenna switch for LTE-A Front-End Module(FEM) is presented in this paper by using CMOS technology. For the usage of LTE-A applications, low loss and high linearity are the key features which are very challenging works under CMOS process. To enhance insertion loss(IL) and power handling capability, this paper adopts asymmetric Transmitter (TX) and RX (Receiver) structure, floating body technique, multi-stacked structure, and feed forward capacitor technique. The designed SPDT switch shows TX IL 0.34 dB, RX IL 0.73 dB, P1dB 38.9 dBm at 0.9 GHz and TX IL 0.37 dB, RX IL 0.95 dB, P1dB 39.1 dBm at 2.5 GHz respectively.Keywords: CMOS switch, SPDT switch, high power CMOS switch, LTE-A FEM
Procedia PDF Downloads 3654769 Press Hardening of Tubes with Additional Interior Spray Cooling
Authors: B. A. Behrens, H. J. Maier, A. Neumann, J. Moritz, S. Hübner, T. Gretzki, F. Nürnberger, A. Spiekermeier
Abstract:
Press-hardened profiles are used e.g. for automotive applications in order to improve light weight construction due to the high reachable strength. The application of interior water-air spray cooling contributes to significantly reducing the cycle time in the production of heat-treated tubes. This paper describes a new manufacturing method for producing press-hardened hollow profiles by means of an additional interior cooling based on a water-air spray. Furthermore, this paper provides the results of thorough investigations on the properties of press-hardened tubes in dependence of varying spray parameters.Keywords: 22MnB5, press hardening, water-air spray cooling, hollow profiles, tubes
Procedia PDF Downloads 2754768 [Keynote Talk]: A Comparative Study on Air Permeability Properties of Multilayered Nonwoven Structures
Authors: M. Kucukali Ozturk, B. Nergis, C. Candan
Abstract:
Air permeability plays an important role for applications such as filtration, thermal and acoustic insulation. The study discussed in this paper was conducted in an attempt to investigate air permeability property of various combinations of nonwovens. The PROWHITE air permeability tester was used for the measurement of the air permeability of the samples in accordance with the relevant standards and a comparative study of the results were made. It was found that the fabric mass per unit area was closely related to the air-permeability. The air permeability decreased with the increase in mass per unit area. Additionally, the air permeability of nonwoven fabrics decreased with the increase in thickness. Moreover, air permeability of multilayered SMS nonwoven structures was lower than those of single layered ones.Keywords: air permeability, mass per unit area, nonwoven structure, polypropylene nonwoven, thickness
Procedia PDF Downloads 347