Search results for: user attributes analysis
27521 Spanish Language Violence Corpus: An Analysis of Offensive Language in Twitter
Authors: Beatriz Botella-Gil, Patricio Martínez-Barco, Lea Canales
Abstract:
The Internet and ICT are an integral element of and omnipresent in our daily lives. Technologies have changed the way we see the world and relate to it. The number of companies in the ICT sector is increasing every year, and there has also been an increase in the work that occurs online, from sending e-mails to the way companies promote themselves. In social life, ICT’s have gained momentum. Social networks are useful for keeping in contact with family or friends that live far away. This change in how we manage our relationships using electronic devices and social media has been experienced differently depending on the age of the person. According to currently available data, people are increasingly connected to social media and other forms of online communication. Therefore, it is no surprise that violent content has also made its way to digital media. One of the important reasons for this is the anonymity provided by social media, which causes a sense of impunity in the victim. Moreover, it is not uncommon to find derogatory comments, attacking a person’s physical appearance, hobbies, or beliefs. This is why it is necessary to develop artificial intelligence tools that allow us to keep track of violent comments that relate to violent events so that this type of violent online behavior can be deterred. The objective of our research is to create a guide for detecting and recording violent messages. Our annotation guide begins with a study on the problem of violent messages. First, we consider the characteristics that a message should contain for it to be categorized as violent. Second, the possibility of establishing different levels of aggressiveness. To download the corpus, we chose the social network Twitter for its ease of obtaining free messages. We chose two recent, highly visible violent cases that occurred in Spain. Both of them experienced a high degree of social media coverage and user comments. Our corpus has a total of 633 messages, manually tagged, according to the characteristics we considered important, such as, for example, the verbs used, the presence of exclamations or insults, and the presence of negations. We consider it necessary to create wordlists that are present in violent messages as indicators of violence, such as lists of negative verbs, insults, negative phrases. As a final step, we will use automatic learning systems to check the data obtained and the effectiveness of our guide.Keywords: human language technologies, language modelling, offensive language detection, violent online content
Procedia PDF Downloads 13327520 Impression Evaluation by Design Change of Anthropomorphic Agent
Authors: Kazuko Sakamoto
Abstract:
Anthropomorphic agents have been successful in areas where there are many human interactions, such as education and medical care. The persuasive effect is also expected in e-shopping sites on the web. This indicates that customer service is not necessarily human but can play that role. However, the 'humanity' in anthropomorphism sometimes has a risk of working negatively. In general, as the appearance of anthropomorphic agents approaches humans, it is thought that their affinity with humans increases. However, when the degree of similarity reaches a certain level, it gives the user a weird feeling. This is the 'eerie valley' phenomenon. This is a concept used in the world of robotics, but it seems to be applicable to anthropomorphic agents such as characters. Then what kind of design can you accept as an anthropomorphic agent that gives you a feeling of friendliness or good feeling without causing discomfort or fear to people? This study focused on this point and examined what design and characteristics would be effective for marketing communication. As a result of the investigation, it was found that there is no need for gaze and blinking, the size of the eyes is normal or large, and the impression evaluation is higher when the structure is as simple as possible. Conversely, agents with high eye-gaze and white-eye ratios had low evaluations, and the negative impact on eye-gaze was particularly large.Keywords: anthropomorphicgents, design evaluation, marketing communication, customer service
Procedia PDF Downloads 11527519 Impact of Similarity Ratings on Human Judgement
Authors: Ian A. McCulloh, Madelaine Zinser, Jesse Patsolic, Michael Ramos
Abstract:
Recommender systems are a common artificial intelligence (AI) application. For any given input, a search system will return a rank-ordered list of similar items. As users review returned items, they must decide when to halt the search and either revise search terms or conclude their requirement is novel with no similar items in the database. We present a statistically designed experiment that investigates the impact of similarity ratings on human judgement to conclude a search item is novel and halt the search. 450 participants were recruited from Amazon Mechanical Turk to render judgement across 12 decision tasks. We find the inclusion of ratings increases the human perception that items are novel. Percent similarity increases novelty discernment when compared with star-rated similarity or the absence of a rating. Ratings reduce the time to decide and improve decision confidence. This suggests the inclusion of similarity ratings can aid human decision-makers in knowledge search tasks.Keywords: ratings, rankings, crowdsourcing, empirical studies, user studies, similarity measures, human-centered computing, novelty in information retrieval
Procedia PDF Downloads 13727518 Coronavirus Academic Paper Sorting Application
Authors: Christina A. van Hal, Xiaoqian Jiang, Luyao Chen, Yan Chu, Robert D. Jolly, Yaobin Lin, Jitian Zhao, Kang Lin Hsieh
Abstract:
The COVID-19 Literature Summary App was created for the primary purpose of enabling academicians and clinicians to quickly sort through the vast array of recent coronavirus publications by topics of interest. Multiple methods of summarizing and sorting the manuscripts were created. A summary page introduces the application function and capabilities, while an interactive map provides daily updates on infection, death, and recovery rates. A page with a pivot table allows publication sorting by topic, with an interactive data table that allows sorting topics by columns, as wells as the capability to view abstracts. Additionally, publications may be sorted by the medical topics they cover. We used the CORD-19 database to compile lists of publications. The data table can sort binary variables, allowing the user to pick desired publication topics, such as papers that describe COVID-19 symptoms. The application is primarily designed for use by researchers but can be used by anybody who wants a faster and more efficient means of locating papers of interest.Keywords: COVID-19, literature summary, information retrieval, Snorkel
Procedia PDF Downloads 15227517 An Ultrasonic Signal Processing System for Tomographic Imaging of Reinforced Concrete Structures
Authors: Edwin Forero-Garcia, Jaime Vitola, Brayan Cardenas, Johan Casagua
Abstract:
This research article presents the integration of electronic and computer systems, which developed an ultrasonic signal processing system that performs the capture, adaptation, and analog-digital conversion to later carry out its processing and visualization. The capture and adaptation of the signal were carried out from the design and implementation of an analog electronic system distributed in stages: 1. Coupling of impedances; 2. Analog filter; 3. Signal amplifier. After the signal conditioning was carried out, the ultrasonic information was digitized using a digital microcontroller to carry out its respective processing. The digital processing of the signals was carried out in MATLAB software for the elaboration of A-Scan, B and D-Scan types of ultrasonic images. Then, advanced processing was performed using the SAFT technique to improve the resolution of the Scan-B-type images. Thus, the information from the ultrasonic images was displayed in a user interface developed in .Net with Visual Studio. For the validation of the system, ultrasonic signals were acquired, and in this way, the non-invasive inspection of the structures was carried out and thus able to identify the existing pathologies in them.Keywords: acquisition, signal processing, ultrasound, SAFT, HMI
Procedia PDF Downloads 10827516 Static and Dynamic Analysis on a Buddhism Goddess Guanyin in Shuangyashan
Authors: Gong Kangming, Zhao Caiqi
Abstract:
High-rise special-shaped structure, such as main frame structure of the statues, is one of the structure forms in irregular structure widely used. Due to the complex shape of the statue structure, with a large aspect ratio, its wind load value and the overall mechanical properties are very different from the high-rise buildings with the general rules. The paper taking a certain 48 meters high main frame structure of the statue located in Shuangyashan City, Heilongjiang Province, static and dynamic properties are analyzed by the finite element software. Through static and dynamic analysis, it got a number of useful conclusions that have a certain reference value for the analysis and design of the future similar structure.Keywords: a Buddhism goddess Guanyin body, wind load, dynamic analysis, bolster, node design
Procedia PDF Downloads 46727515 The Influence of Activity Selection and Travel Distance on Forest Recreation Policies
Authors: Mark Morgan, Christine Li, Shuangyu Xu, Jenny McCarty
Abstract:
The National Wild and Scenic Rivers System was created by the U.S. Congress in 1968 (Public Law 90-542; 16 U.S.C. 1271 et seq.) to preserve outstanding natural, cultural, and recreational values of some U.S. rivers in a free-flowing condition for the enjoyment of present and future generations. This Act is notable for safeguarding the special character of these rivers while supporting management action that encourages public participation for co-creating river protection goals and strategies. This is not an easy task. To meet the challenges of modern ecosystem management, federal resource agencies must address many legal, environmental, economic, political, and social issues. The U.S. Forest Service manages a 44-mile section of the Eleven Point National Scenic River (EPR) in southern Missouri, mainly for outdoor recreation purposes. About half of the acreage is in private lands, while the remainder flows through the Mark Twain National Forest. Private land along the river is managed by scenic easements to ensure protection of scenic values and natural resources, without public access. A portion of the EPR lies adjacent to a 16,500-acre tract known as the Irish Wilderness. The spring-fed river has steep bluffs, deep pools, clear water, and a slow current, making it an ideal setting for outdoor enthusiasts. A 10-month visitor study was conducted at five access points along the EPR during 2019 so the US Forest Service could update their river management plan. A mail-back survey was administered to 560 on-site visitors, yielding a response rate of 53%. Although different types of visitors use the EPR, boating and fishing were the predominant forms of outdoor recreation. Some river use was from locals, but other visitors came from farther away. Formulating unbiased policies for outdoor recreation is difficult because managers must assign relative values to recreational activities and travel distance. Because policymaking is a subjective process, management decisions can affect user groups in different ways (i.e., boaters vs. fishers; proximate vs. distal visitors), as seen through a GIS analysis.Keywords: activity selection, forest recreation, policy, travel distance
Procedia PDF Downloads 14227514 A Characterization of Skew Cyclic Code with Complementary Dual
Authors: Eusebio Jr. Lina, Ederlina Nocon
Abstract:
Cyclic codes are a fundamental subclass of linear codes that enjoy a very interesting algebraic structure. The class of skew cyclic codes (or θ-cyclic codes) is a generalization of the notion of cyclic codes. This a very large class of linear codes which can be used to systematically search for codes with good properties. A linear code with complementary dual (LCD code) is a linear code C satisfying C ∩ C^⊥ = {0}. This subclass of linear codes provides an optimum linear coding solution for a two-user binary adder channel and plays an important role in countermeasures to passive and active side-channel analyses on embedded cryptosystems. This paper aims to identify LCD codes from the class of skew cyclic codes. Let F_q be a finite field of order q, and θ be an automorphism of F_q. Some conditions for a skew cyclic code to be LCD were given. To this end, the properties of a noncommutative skew polynomial ring F_q[x, θ] of automorphism type were revisited, and the algebraic structure of skew cyclic code using its skew polynomial representation was examined. Using the result that skew cyclic codes are left ideals of the ring F_q[x, θ]/〈x^n-1〉, a characterization of a skew cyclic LCD code of length n was derived. A necessary condition for a skew cyclic code to be LCD was also given.Keywords: LCD cyclic codes, skew cyclic LCD codes, skew cyclic complementary dual codes, theta-cyclic codes with complementary duals
Procedia PDF Downloads 34627513 Collaborative and Context-Aware Learning Approach Using Mobile Technology
Authors: Sameh Baccari, Mahmoud Neji
Abstract:
In recent years, the rapid developments on mobile devices and wireless technologies enable new dimension capabilities for the learning domain. This dimension facilitates people daily activities and shortens the distances between individuals. When these technologies have been used in learning, a new paradigm has been emerged giving birth to mobile learning. Because of the mobility feature, m-learning courses have to be adapted dynamically to the learner’s context. The main challenge in context-aware mobile learning is to develop an approach building the best learning resources according to dynamic learning situations. In this paper, we propose a context-aware mobile learning system called Collaborative and Context-aware Mobile Learning System (CCMLS). It takes into account the requirements of Mobility, Collaboration and Context-Awareness. This system is based on the semantic modeling of the learning context and the learning content. The adaptation part of this approach is made up of adaptation rules to propose and select relevant resources, learning partners and learning activities based not only on the user’s needs, but also on its current context.Keywords: mobile learning, mobile technologies, context-awareness, collaboration, semantic web, adaptation engine, adaptation strategy, learning object, learning context
Procedia PDF Downloads 30827512 Analysis of Efficacy and Safety of Abatacept for Rheumatoid Arthritis: A Systematic Review and Meta Analysis
Authors: Hamida Memon
Abstract:
Rheumatoid arthritis (RA) is a persistent inflammation of the joints caused by an aggressive immune reaction leading to pain, stiffness, and limited function. Abatacept, a selective co-modulator, is a promising option for treatment and may have better safety profiles compared to other interventions. This meta-analysis aims at assessing the effectiveness and safety of abatacept in contrast to various RA treatments such as placebos, biological DMARDs and conventional DMARDs. The analysis assesses how abatacept influences disease activity, pain intensity and overall patient functionality. It weighs the risk factor of abatacept with other drugs such as tocilizumab, with the numbers being lower for abatacept. This meta-analysis aims at assessing the effectiveness and safety of abatacept in contrast to various RA treatments such as placebos, biological DMARDs and conventional DMARDs. The analysis assesses how abatacept influences disease activity, pain intensity and overall patient functionality. It weighs the risk factor of abatacept with other drugs such as tocilizumab, with the numbers being lower for abatacept.Keywords: Rheumatoid arthritis, abatacept, control group, bone disease
Procedia PDF Downloads 2427511 Criticality of Socio-Cultural Factors in Public Policy: A Study of Reproductive Health Care in Rural West Bengal
Authors: Arindam Roy
Abstract:
Public policy is an intriguing terrain, which involves complex interplay of administrative, social political and economic components. There is hardly any fit-for all formulation of public policy as Lindbloom has aptly categorized it as a science of muddling through. In fact, policies are both temporally and contextually determined as one the proponents of policy sciences Harold D Lasswell has underscored it in his ‘contextual-configurative analysis’ as early as 1950s. Though, a lot of theoretical efforts have been made to make sense of this intricate dynamics of policy making, at the end of the day the applied area of public policy negates any such uniform, planned and systematic formulation. However, our policy makers seem to have learnt very little of that. Until recently, policy making was deemed as an absolutely specialized exercise to be conducted by a cadre of professionally trained seasoned mandarin. Attributes like homogeneity, impartiality, efficiency, and neutrality were considered as the watchwords of delivering common goods. Citizen or clientele was conceptualized as universal political or economic construct, to be taken care of uniformly. Moreover, policy makers usually have the proclivity to put anything into straightjacket, and to ignore the nuances therein. Hence, least attention has been given to the ground level reality, especially the socio-cultural milieu where the policy is supposed to be applied. Consequently, a substantial amount of public money goes in vain as the intended beneficiaries remain indifferent to the delivery of public policies. The present paper in the light of Reproductive Health Care policy in rural West Bengal has tried to underscore the criticality of socio-cultural factors in public health delivery. Indian health sector has traversed a long way. From a near non-existent at the time of independence, the Indian state has gradually built a country-wide network of health infrastructure. Yet it has to make a major breakthrough in terms of coverage and penetration of the health services in the rural areas. Several factors are held responsible for such state of things. These include lack of proper infrastructure, medicine, communication, ambulatory services, doctors, nursing services and trained birth attendants. Policy makers have underlined the importance of supply side in policy formulation and implementation. The successive policy documents concerning health delivery bear the testimony of it. The present paper seeks to interrogate the supply-side oriented explanations for the failure of the delivery of health services. Instead, it identified demand side to find out the answer. The state-led and bureaucratically engineered public health measures fail to engender demands as these measures mostly ignore socio-cultural nuances of health and well-being. Hence, the hiatus between supply side and demand side leads to huge wastage of revenue as health infrastructure, medicine and instruments remain unutilized in most cases. Therefore, taking proper cognizance of these factors could have streamlined the delivery of public health.Keywords: context, policy, socio-cultural factor, uniformity
Procedia PDF Downloads 31727510 Multi-Modal Visualization of Working Instructions for Assembly Operations
Authors: Josef Wolfartsberger, Michael Heiml, Georg Schwarz, Sabrina Egger
Abstract:
Growing individualization and higher numbers of variants in industrial assembly products raise the complexity of manufacturing processes. Technical assistance systems considering both procedural and human factors allow for an increase in product quality and a decrease in required learning times by supporting workers with precise working instructions. Due to varying needs of workers, the presentation of working instructions leads to several challenges. This paper presents an approach for a multi-modal visualization application to support assembly work of complex parts. Our approach is integrated within an interconnected assistance system network and supports the presentation of cloud-streamed textual instructions, images, videos, 3D animations and audio files along with multi-modal user interaction, customizable UI, multi-platform support (e.g. tablet-PC, TV screen, smartphone or Augmented Reality devices), automated text translation and speech synthesis. The worker benefits from more accessible and up-to-date instructions presented in an easy-to-read way.Keywords: assembly, assistive technologies, augmented reality, manufacturing, visualization
Procedia PDF Downloads 16527509 Transient Analysis of Laminated Rubber Bearing Bridge during High Intensity Earthquake
Authors: N. M. Amin, W. N. A. W. Sulaiman
Abstract:
The effectiveness of the seismic response between 3D solid elements model and simplified beam elements model has been investigated. At present, the studies of the numerical modelling using 3D solid element are minimal due to numerical software constraint. The finite element analysis using 3D solid element was chosen to study displacement response of laminated rubber bearing (LRB) during high intensity Kobe earthquake. In this research a simply supported bridge (single span), fixed at support was analysed by using transient analysis subjected to real time history loading of Kobe earthquake.Keywords: laminated rubber bearing, solid element, simplified beam element, transient analysis
Procedia PDF Downloads 42927508 Some Observations on the Analysis of Four Performances of the Allemande from J.S. Bach's Partita for Solo Flute (BWV 1013) in Terms of Zipf's Law
Authors: Douglas W. Scott
Abstract:
The Allemande from J. S. Bach's Partita for solo flute (BWV 1013) presents many unique challenges for any flautist, especially in terms of segmentation analysis required to select breathing places in the first half. Without claiming to identify a 'correct' solution to this problem, this paper analyzes the section in terms of a set of techniques based around a statistical property commonly (if not ubiquitously) found in music, namely Zipf’s law. Specifically, the paper considers violations of this expected profile at various levels of analysis, an approach which has yielded interesting insights in previous studies. The investigation is then grounded by considering four actual solutions to the problem found in recordings made by different flautists, which opens up the possibility of expanding Zipfian analysis to include a consideration of inter-onset-intervals (IOIs). It is found that significant deviations from the expected Zipfian distributions can reveal and highlight stylistic choices made by different performers.Keywords: inter-onset-interval, Partita for solo flute, BWV 1013, segmentation analysis, Zipf’s law
Procedia PDF Downloads 18527507 Interactive Planning of Suburban Apartment Buildings
Authors: J. Koiso-Kanttila, A. Soikkeli, A. Aapaoja
Abstract:
Construction in Finland is focusing increasingly on renovation instead of conventional new construction, and this trend will continue to grow in the coming years and decades. Renovation of the large number of suburban residential apartment buildings built in the 1960s and 1970s poses a particular challenge. However, renovation projects are demanding for the residents of these buildings, since they usually are uninitiated in construction issues. On the other hand, renovation projects generally apply the operating models of new construction. Nevertheless, the residents of an existing residential apartment building are some of the best experts on the site. Thus, in this research project we applied a relational model in developing and testing at case sites a planning process that employs interactive planning methods. Current residents, housing company managers, the city zoning manager, the contractor’s and prefab element supplier’s representatives, professional designers and researchers all took part in the planning. The entire interactive planning process progressed phase by phase as the participants’ and designers’ concerted discussion and ideation process, so that the end result was a renovation plan desired by the residents.Keywords: apartment building renovation, interactive planning, project alliance, user-orientedness
Procedia PDF Downloads 38527506 Predicting Automotive Interior Noise Including Wind Noise by Statistical Energy Analysis
Authors: Yoshio Kurosawa
Abstract:
The applications of soundproof materials for reduction of high frequency automobile interior noise have been researched. This paper presents a sound pressure prediction technique including wind noise by Hybrid Statistical Energy Analysis (HSEA) in order to reduce weight of acoustic insulations. HSEA uses both analytical SEA and experimental SEA. As a result of chassis dynamo test and road test, the validity of SEA modeling was shown, and utility of the method was confirmed.Keywords: vibration, noise, road noise, statistical energy analysis
Procedia PDF Downloads 35227505 Breaking through Barricades to Enhance the University Library Infrastructure to Aid the Visually Challenged - Contemplated Based within the Sri Lankan Context
Authors: Wilfred Jeyatheese Jeyaraj
Abstract:
The Sri Lankan legislative acts dictate several recommendations to improve accessibility of services for the visually challenged. But the main consideration here is the feasibility and extent to which these endorsements have been implemented in actuality within Sri Lankan academic libraries. This paper tends to assess the existent issues that impediment the implementation of accessibility features for the visually challenged in Sri Lankan academic libraries. Visually challenged students continually walk through immense challenges to step forth into their university life. Reaching their undergrad stage of their academic phase, they should be entitled to access information resources with ease and with equality in comparison to the sighted users of a university library. The current university libraries in Sri Lanka, have well improved services that they render to their users. But, what lacks in this scenario is the consideration as to whether these features offered by libraries are user-friendly and easily accessible by the visually challenged users as well. Hence, this paper tends to analyze the inhibitions in delivering services oriented towards the visually challenged and the sighted, and propose feasible alternatives to create a neutral high-end university library environment.Keywords: accessibility, university library, Sri Lanka, visually-challenged
Procedia PDF Downloads 29127504 Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment
Authors: Xiaoqing Wang, Jianjian Zong, Li Li, Yanxing Zheng, Jinrong Tong, Mao Zhan
Abstract:
With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment.Keywords: data sharing, cross-domain, data exchange, publish-subscribe
Procedia PDF Downloads 12527503 Design and Manufacture of Non-Contact Moving Load for Experimental Analysis of Beams
Authors: Firooz Bakhtiari-Nejad, Hamidreza Rostami, Meysam Mirzaee, Mona Zandbaf
Abstract:
Dynamic tests are an important step of the design of engineering structures, because the accuracy of predictions of theoretical–numerical procedures can be assessed. In experimental test of moving loads that is one of the major research topics, the load is modeled as a simple moving mass or a small vehicle. This paper deals with the applicability of Non-Contact Moving Load (NML) for vibration analysis. For this purpose, an experimental set-up is designed to generate the different types of NML including constant and harmonic. The proposed method relies on pressurized air which is useful, especially when dealing with fragile or sensitive structures. To demonstrate the performance of this system, the set-up is employed for a modal analysis of a beam and detecting crack of the beam. The obtained results indicate that the experimental set-up for NML can be an attractive alternative to the moving load problems.Keywords: experimental analysis, moving load, non-contact excitation, materials engineering
Procedia PDF Downloads 46727502 Flow and Heat Transfer over a Shrinking Sheet: A Stability Analysis
Authors: Anuar Ishak
Abstract:
The characteristics of fluid flow and heat transfer over a permeable shrinking sheet is studied. The governing partial differential equations are transformed into a set of ordinary differential equations, which are then solved numerically using MATLAB routine boundary value problem solver bvp4c. Numerical results show that dual solutions are possible for a certain range of the suction parameter. A stability analysis is performed to determine which solution is linearly stable and physically realizable.Keywords: dual solutions, heat transfer, shrinking sheet, stability analysis
Procedia PDF Downloads 42127501 Transportation Mode Choice Analysis for Accessibility of the Mehrabad International Airport by Statistical Models
Authors: Navid Mirzaei Varzeghani, Mahmoud Saffarzadeh, Ali Naderan, Amirhossein Taheri
Abstract:
Countries are progressing, and the world's busiest airports see year-on-year increases in travel demand. Passenger acceptability of an airport depends on the airport's appeals, which may include one of these routes between the city and the airport, as well as the facilities to reach them. One of the critical roles of transportation planners is to predict future transportation demand so that an integrated, multi-purpose system can be provided and diverse modes of transportation (rail, air, and land) can be delivered to a destination like an airport. In this study, 356 questionnaires were filled out in person over six days. First, the attraction of business and non-business trips was studied using data and a linear regression model. Lower travel costs, a range of ages more significant than 55, and other factors are essential for business trips. Non-business travelers, on the other hand, have prioritized using personal vehicles to get to the airport and ensuring convenient access to the airport. Business travelers are also less price-sensitive than non-business travelers regarding airport travel. Furthermore, carrying additional luggage (for example, more than one suitcase per person) undoubtedly decreases the attractiveness of public transit. Afterward, based on the manner and purpose of the trip, the locations with the highest trip generation to the airport were identified. The most famous district in Tehran was District 2, with 23 visits, while the most popular mode of transportation was an online taxi, with 12 trips from that location. Then, significant variables in separation and behavior of travel methods to access the airport were investigated for all systems. In this scenario, the most crucial factor is the time it takes to get to the airport, followed by the method's user-friendliness as a component of passenger preference. It has also been demonstrated that enhancing public transportation trip times reduces private transportation's market share, including taxicabs. Based on the responses of personal and semi-public vehicles, the desire of passengers to approach the airport via public transportation systems was explored to enhance present techniques and develop new strategies for providing the most efficient modes of transportation. Using the binary model, it was clear that business travelers and people who had already driven to the airport were the least likely to change.Keywords: multimodal transportation, demand modeling, travel behavior, statistical models
Procedia PDF Downloads 17527500 A Compared Approach between Moderate Islamic Values and Basic Human Values
Authors: Adel Bessadok
Abstract:
The theory of values postulates that each human has a set of values, or attractive and trans-situational goals, that drive their actions. The Basic Human Values as an incentive construct that apprehends human's values have been shown to govern a wide range of human behaviors. Individuals within and within societies have very different value preferences that reflect their enculturation, their personal experiences, their social places and their genetic heritage. Using a focus group composed by Islamic religious Preachers and a sample of 800 young students; this ongoing study will establish Moderate Islamic Values parameters. We analyze later, for the same students sample the difference between Moderate Islamic Values and Schwartz’s Basic Human Values. Keywords—Moderate Islamic Values, Basic Human Values, Exploratory Factor Analysis and Confirmatory Factor Analysis.Keywords: moderate Islamic values, basic human values, exploratory factor analysis, confirmatory factor analysis
Procedia PDF Downloads 38427499 The Effects of Nanoemulsions Based on Commercial Oils for the Quality of Vacuum-Packed Sea Bass at 2±2°C
Authors: Mustafa Durmuş, Yesim Ozogul, Esra Balıkcı, Saadet Gokdoğan, Fatih Ozogul, Ali Rıza Köşker, İlknur Yuvka
Abstract:
Food scientists and researchers have paid attention to develop new ways for improving the nutritional value of foods. The application of nanotechnology techniques to the food industry may allow the modification of food texture, taste, sensory attributes, coloring strength, processability, and stability during shelf life of products. In this research, the effects of nanoemulsions based on commercial oils for vacuum-packed sea bass fillets stored at 2±2°C were investigated in terms of the sensory, chemical (total volatile basic nitrogen (TVB-N), thiobarbituric acid (TBA), peroxide value (PV) and free fatty acids (FFA), pH, water holding capacity (WHC)) and microbiological qualities (total anaerobic bacteria and total lactic acid bacteria). Physical properties of emulsions (viscosity, the particle size of droplet, thermodynamic stability, refractive index, and surface tension) were determined. Nanoemulsion preparation method was based on high energy principle, with ultrasonic homojenizator. Sensory analyses of raw fish showed that the demerit points of the control group were found higher than those of treated groups. The sensory score (odour, taste and texture) of the cooked fillets decreased with storage time, especially in the control. Results obtained from chemical and microbiological analyses also showed that nanoemulsions significantly (p<0.05) decreased the values of biochemical parameters and growth of bacteria during storage period, thus improving quality of vacuum-packed sea bass.Keywords: quality parameters, nanoemulsion, sea bass, shelf life, vacuum packing
Procedia PDF Downloads 45927498 Efficiency of DMUs in Presence of New Inputs and Outputs in DEA
Authors: Esmat Noroozi, Elahe Sarfi, Farha Hosseinzadeh Lotfi
Abstract:
Examining the impacts of data modification is considered as sensitivity analysis. A lot of studies have considered the data modification of inputs and outputs in DEA. The issues which has not heretofore been considered in DEA sensitivity analysis is modification in the number of inputs and (or) outputs and determining the impacts of this modification in the status of efficiency of DMUs. This paper is going to present systems that show the impacts of adding one or multiple inputs or outputs on the status of efficiency of DMUs and furthermore a model is presented for recognizing the minimum number of inputs and (or) outputs from among specified inputs and outputs which can be added whereas an inefficient DMU will become efficient. Finally the presented systems and model have been utilized for a set of real data and the results have been reported.Keywords: data envelopment analysis, efficiency, sensitivity analysis, input, out put
Procedia PDF Downloads 45027497 Innovation and Analysis of Vibrating Fork Level Switch
Authors: Kuen-Ming Shu, Cheng-Yu Chen
Abstract:
A vibrating-fork sensor can measure the level height of solids and liquids and operates according to the principle that vibrations created by piezoelectric ceramics are transmitted to the vibrating fork, which produces resonance. When the vibrating fork touches an object, its resonance frequency changes and produces a signal that returns to a controller for immediate adjustment, so as to effectively monitor raw material loading. The design of the vibrating fork in a vibrating-fork material sensor is crucial. In this paper, ANSYS finite element analysis software is used to perform modal analysis on the vibrations of the vibrating fork. In addition, to design and produce a superior vibrating fork, the dimensions and welding shape of the vibrating fork are compared in a simulation performed using the Taguchi method.Keywords: vibrating fork, piezoelectric ceramics, sound wave, ANSYS, Taguchi method, modal analysis
Procedia PDF Downloads 24927496 Anthropomorphic Interfaces For User Trust in a Highly Automated Driving
Authors: Clarisse Lawson-Guidigbe, Nicolas Louveton, Kahina Amokrane-Ferka, Jean-Marc Andre
Abstract:
Trust in automated driving systems is receiving growing attention in the research community. Anthropomorphism has been identified by past research as a trust-building factor. In this paper, we consider three anthropomorphic interfaces integrating three versions of a virtual assistant. We attempt to measure the impact of each of these interfaces on trust in the automated driving system. An experiment following a between-subject design was conducted in a driving simulator (N = 36) to evaluate participants’ performance and experience in two handover situations (a simple one and a critical one). Perception of anthropomorphism and trust was measured using scales, while participants’ experience was measured during elicitation interviews. We found no significant difference between the three interfaces regarding the perception of anthropomorphism, trust levels, or experience. However, regarding participants’ performance, we found a significant difference between the three interfaces in the simple handover situations but not the critical one. Learnings from anthropomorphism and trust measurement scales are discussed and suggestions for further research are proposed.Keywords: highly automated driving, trust, anthropomorphic design, mindful anthropomorphism, mindless anthropomorphism
Procedia PDF Downloads 14827495 Convex Restrictions for Outage Constrained MU-MISO Downlink under Imperfect Channel State Information
Authors: A. Preetha Priyadharshini, S. B. M. Priya
Abstract:
In this paper, we consider the MU-MISO downlink scenario, under imperfect channel state information (CSI). The main issue in imperfect CSI is to keep the probability of each user achievable outage rate below the given threshold level. Such a rate outage constraints present significant and analytical challenges. There are many probabilistic methods are used to minimize the transmit optimization problem under imperfect CSI. Here, decomposition based large deviation inequality and Bernstein type inequality convex restriction methods are used to perform the optimization problem under imperfect CSI. These methods are used for achieving improved output quality and lower complexity. They provide a safe tractable approximation of the original rate outage constraints. Based on these method implementations, performance has been evaluated in the terms of feasible rate and average transmission power. The simulation results are shown that all the two methods offer significantly improved outage quality and lower computational complexity.Keywords: imperfect channel state information, outage probability, multiuser- multi input single output, channel state information
Procedia PDF Downloads 81427494 Secure Text Steganography for Microsoft Word Document
Authors: Khan Farhan Rafat, M. Junaid Hussain
Abstract:
Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography
Procedia PDF Downloads 24327493 Analysis of the Secondary Stationary Flow Around an Oscillating Circular Cylinder
Authors: Artem Nuriev, Olga Zaitseva
Abstract:
This paper is devoted to the study of a viscous incompressible flow around a circular cylinder performing harmonic oscillations, especially the steady streaming phenomenon. The research methodology is based on the asymptotic explanation method combined with the computational bifurcation analysis. Present studies allow to identify several regimes of the secondary streaming with different flow structures. The results of the research are in good agreement with experimental and numerical simulation data.Keywords: oscillating cylinder, secondary streaming, flow regimes, asymptotic and bifurcation analysis
Procedia PDF Downloads 43927492 Monitoring System for Electronic Procurement Systems
Authors: Abdulah Fajar
Abstract:
Electronic Procurement System has been implemented at government institution in Indonesia. This system has been developed centrally at Institution of National Procurement Policy (LKPP) and implemented autonomously at either local or national government institution. The lack of competency at many institution on Information Technology Management arise several major problems. The main concern of LKPP to local administrator is assured that the system is running normally and always be able to serve the needs of its users. Monitoring system has been identified as the one of solution to prevent the problems appeared. Monitoring system is developed using Simple Network Management Protocol (SNMP) and implemented at LKPP. There are two modules; Main Dashboard and Local Agent. Main Dashboard is intended for LKPP and Local Agent is intended to implement at local autonomous e-procurement system (LPSE). There are several resources that must be monitored such as computation, memory and network traffic. Agile paradigm is applied to this project to assure user and system requirement is met. The length of project is the one of reason why agile paradigm has been chosen. The system has been successfully delivered to LKPP.Keywords: procurement system, SNMP, LKPP, LPSE
Procedia PDF Downloads 427