Search results for: semantic field theory.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12675

Search results for: semantic field theory.

12435 SVM-DTC Using for PMSM Speed Tracking Control

Authors: Kendouci Khedidja, Mazari Benyounes, Benhadria Mohamed Rachid, Dadi Rachida

Abstract:

In recent years, direct torque control (DTC) has become an alternative to the well-known vector control especially for permanent magnet synchronous motor (PMSM). However, it presents a problem of field linkage and torque ripple. In order to solve this problem, the conventional DTC is combined with space vector pulse width modulation (SVPWM). This control theory has achieved great success in the control of PMSM. That has become a hotspot for resolving. The main objective of this paper gives us an introduction of the DTC and SVPWM-DTC control theory of PMSM which has been simulating on each part of the system via Matlab/Simulink based on the mathematical modeling. Moreover, the outcome of the simulation proved that the improved SVPWM- DTC of PMSM has a good dynamic and static performance.

Keywords: PMSM, DTC, SVM, speed control

Procedia PDF Downloads 383
12434 Application of Waterflooding to the Kashkari Oil Field in Northern Afghanistan

Authors: Zabihullah Mahdi, Mahdi Nayab, Sadaf Jalal, Navid Seddiqi

Abstract:

Hydrocarbons represent an important natural resource for the rehabilitation and sustainable development of Afghanistan. In this paper, the use of waterflooding is demonstrated for the petroleum reservoirs of the Kashkari oil field in northern Afghanistan. The technique is based on the Buckley–Leverett frontal-displacement theory, which enables computation of the progress of the waterfront in the reservoir. The relative permeabilities of oil and water, the residual oil saturation, and the irreducible water saturation are obtained from a laboratory experiment. The technique is applied to the laboratory plane-reservoir model to investigate the displacement mechanism and is then compared with the theoretical calculation. Lastly, the technique is applied to the Kashkari oil field to predict the feasible amount of oil that could be produced from this reservoir.

Keywords: Buckley–Leverett, waterflooding, petroleum reservoir engineering, two-phase flow, immiscible displacement, porous media, relative permeability

Procedia PDF Downloads 195
12433 Resource Framework Descriptors for Interestingness in Data

Authors: C. B. Abhilash, Kavi Mahesh

Abstract:

Human beings are the most advanced species on earth; it's all because of the ability to communicate and share information via human language. In today's world, a huge amount of data is available on the web in text format. This has also resulted in the generation of big data in structured and unstructured formats. In general, the data is in the textual form, which is highly unstructured. To get insights and actionable content from this data, we need to incorporate the concepts of text mining and natural language processing. In our study, we mainly focus on Interesting data through which interesting facts are generated for the knowledge base. The approach is to derive the analytics from the text via the application of natural language processing. Using semantic web Resource framework descriptors (RDF), we generate the triple from the given data and derive the interesting patterns. The methodology also illustrates data integration using the RDF for reliable, interesting patterns.

Keywords: RDF, interestingness, knowledge base, semantic data

Procedia PDF Downloads 159
12432 Towards Establishing a Universal Theory of Project Management

Authors: Divine Kwaku Ahadzie

Abstract:

Project management (PM) as a concept has evolved from the early 20th Century into a recognized academic and professional discipline, and indications are that it has come to stay in the 21st Century as a world-wide paradigm shift for managing successful construction projects. However, notwithstanding the strong inroads that PM has made in legitimizing its academic and professional status in construction management practice, the underlining philosophies are still based on cases and conventional practices. An important theoretical issue yet to be addressed is the lack of a universal theory that offers philosophical legitimacy for the PM concept as a uniquely specialized management concept. Here, it is hypothesized that the law of entropy, the theory of uncertainties and the theory of risk management offer plausible explanations for addressing the lacuna of what constitute PM theory. The theoretical bases of these plausible underlying theories are argued and attempts made to establish the functional relationships that exist between these theories and the PM concept. The paper then draws on data related to the success and/or failure of a number of construction projects to validate the theory.

Keywords: concepts, construction, project management, universal theory

Procedia PDF Downloads 326
12431 A Study of Mandarin Ba Constructions from the Perspective of Event Structure

Authors: Changyin Zhou

Abstract:

Ba constructions are a special type of constructions in Chinese. Their syntactic behaviors are closely related to their event structural properties. The existing study which treats the semantic function of Ba as causative meets difficulty in treating the discrepancy between Ba constructions and their corresponding constructions without Ba in expressing causativity. This paper holds that Ba in Ba constructions is a functional category expressing affectedness. The affectedness expressed by Ba can be positive or negative. The functional category Ba expressing negative affectedness has the semantic property of being 'expected'. The precondition of Ba construction is the boundedness of the event concerned. This paper, holding the parallelism between motion events and change-of-state events, proposes a syntactic model based on the notions of boundedness and affectedness, discusses the transformations between Ba constructions and the related resultative constructions, and derivates the various Ba constructions concerned.

Keywords: affectedness, Ba constructions, boundedness, event structure, resultative constructions

Procedia PDF Downloads 421
12430 Classification of Contexts for Mentioning Love in Interviews with Victims of the Holocaust

Authors: Marina Yurievna Aleksandrova

Abstract:

Research of the Holocaust retains value not only for history but also for sociology and psychology. One of the most important fields of study is how people were coping during and after this traumatic event. The aim of this paper is to identify the main contexts of the topic of love and to determine which contexts are more characteristic for different groups of victims of the Holocaust (gender, nationality, age). In this research, transcripts of interviews with Holocaust victims that were collected during 1946 for the "Voices of the Holocaust" project were used as data. Main contexts were analyzed with methods of network analysis and latent semantic analysis and classified by gender, age, and nationality with random forest. The results show that love is articulated and described significantly differently for male and female informants, nationality is shown results with lower values of quality metrics, as well as the age.

Keywords: Holocaust, latent semantic analysis, network analysis, text-mining, random forest

Procedia PDF Downloads 178
12429 Policy Compliance in Information Security

Authors: R. Manjula, Kaustav Bagchi, Sushant Ramesh, Anush Baskaran

Abstract:

In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful.

Keywords: information technology, information security, involvement theory, policies, social bond theory

Procedia PDF Downloads 367
12428 Deep Vision: A Robust Dominant Colour Extraction Framework for T-Shirts Based on Semantic Segmentation

Authors: Kishore Kumar R., Kaustav Sengupta, Shalini Sood Sehgal, Poornima Santhanam

Abstract:

Fashion is a human expression that is constantly changing. One of the prime factors that consistently influences fashion is the change in colour preferences. The role of colour in our everyday lives is very significant. It subconsciously explains a lot about one’s mindset and mood. Analyzing the colours by extracting them from the outfit images is a critical study to examine the individual’s/consumer behaviour. Several research works have been carried out on extracting colours from images, but to the best of our knowledge, there were no studies that extract colours to specific apparel and identify colour patterns geographically. This paper proposes a framework for accurately extracting colours from T-shirt images and predicting dominant colours geographically. The proposed method consists of two stages: first, a U-Net deep learning model is adopted to segment the T-shirts from the images. Second, the colours are extracted only from the T-shirt segments. The proposed method employs the iMaterialist (Fashion) 2019 dataset for the semantic segmentation task. The proposed framework also includes a mechanism for gathering data and analyzing India’s general colour preferences. From this research, it was observed that black and grey are the dominant colour in different regions of India. The proposed method can be adapted to study fashion’s evolving colour preferences.

Keywords: colour analysis in t-shirts, convolutional neural network, encoder-decoder, k-means clustering, semantic segmentation, U-Net model

Procedia PDF Downloads 109
12427 Automatic Multi-Label Image Annotation System Guided by Firefly Algorithm and Bayesian Method

Authors: Saad M. Darwish, Mohamed A. El-Iskandarani, Guitar M. Shawkat

Abstract:

Nowadays, the amount of available multimedia data is continuously on the rise. The need to find a required image for an ordinary user is a challenging task. Content based image retrieval (CBIR) computes relevance based on the visual similarity of low-level image features such as color, textures, etc. However, there is a gap between low-level visual features and semantic meanings required by applications. The typical method of bridging the semantic gap is through the automatic image annotation (AIA) that extracts semantic features using machine learning techniques. In this paper, a multi-label image annotation system guided by Firefly and Bayesian method is proposed. Firstly, images are segmented using the maximum variance intra cluster and Firefly algorithm, which is a swarm-based approach with high convergence speed, less computation rate and search for the optimal multiple threshold. Feature extraction techniques based on color features and region properties are applied to obtain the representative features. After that, the images are annotated using translation model based on the Net Bayes system, which is efficient for multi-label learning with high precision and less complexity. Experiments are performed using Corel Database. The results show that the proposed system is better than traditional ones for automatic image annotation and retrieval.

Keywords: feature extraction, feature selection, image annotation, classification

Procedia PDF Downloads 583
12426 Principles of Teaching for Successful Intelligence

Authors: Shabnam

Abstract:

The purpose of this study was to see importance of successful intelligence in education which can enhance achievement. There are a number of researches which have tried to apply psychological theories of education and many researches emphasized the role of thinking and intelligence. While going through the various researches, it was found that many students could learn more effectively than they do, if they were taught in a way that better matched their patterns of abilities. Attempts to apply psychological theories to education can falter on the translation of the theory into educational practice. Often, this translation is not clear. Therefore, when a program does not succeed, it is not clear whether the lack of success was due to the inadequacy of the theory or the inadequacy of the implementation of the theory. A set of basic principles for translating a theory into practice can help clarify just what an educational implementation should (and should not) look like. Sternberg’s theory of successful intelligence; analytical, creative and practical intelligence provides a way to create such a match. The results suggest that theory of successful intelligence provides successful interventions in classrooms and provides a proven model for gifted education. This article presents principles for translating a triarchic theory of successful intelligence into educational practice.

Keywords: successful intelligence, analytical, creative and practical intelligence, achievement, success, resilience

Procedia PDF Downloads 586
12425 Applied Theory Building to Achieve Success in Iran Municipalities

Authors: Morteza Rahiminejad

Abstract:

There are over 1200 cities and municipalities all around Iran, including 30 mega cities, which municipal organizations, Interior ministries, and city councils supervise. Even so, there has been neither any research about the process of success nor performance assessment in municipalities. In this research an attempt is made to build a comprehensive theory (or model) to show the reasons or success process among the local governments. The present research is based on the contingency approach in which the relevant circumstances are important, and both environment and situations call for their own management methods. The methodology of research is grounded theory, which uses Atlas.ti software as a tool.

Keywords: success, municipality, Iran, theory building

Procedia PDF Downloads 33
12424 Graph-Based Semantical Extractive Text Analysis

Authors: Mina Samizadeh

Abstract:

In the past few decades, there has been an explosion in the amount of available data produced from various sources with different topics. The availability of this enormous data necessitates us to adopt effective computational tools to explore the data. This leads to an intense growing interest in the research community to develop computational methods focused on processing this text data. A line of study focused on condensing the text so that we are able to get a higher level of understanding in a shorter time. The two important tasks to do this are keyword extraction and text summarization. In keyword extraction, we are interested in finding the key important words from a text. This makes us familiar with the general topic of a text. In text summarization, we are interested in producing a short-length text which includes important information about the document. The TextRank algorithm, an unsupervised learning method that is an extension of the PageRank (algorithm which is the base algorithm of Google search engine for searching pages and ranking them), has shown its efficacy in large-scale text mining, especially for text summarization and keyword extraction. This algorithm can automatically extract the important parts of a text (keywords or sentences) and declare them as a result. However, this algorithm neglects the semantic similarity between the different parts. In this work, we improved the results of the TextRank algorithm by incorporating the semantic similarity between parts of the text. Aside from keyword extraction and text summarization, we develop a topic clustering algorithm based on our framework, which can be used individually or as a part of generating the summary to overcome coverage problems.

Keywords: keyword extraction, n-gram extraction, text summarization, topic clustering, semantic analysis

Procedia PDF Downloads 63
12423 Ontological Modeling Approach for Statistical Databases Publication in Linked Open Data

Authors: Bourama Mane, Ibrahima Fall, Mamadou Samba Camara, Alassane Bah

Abstract:

At the level of the National Statistical Institutes, there is a large volume of data which is generally in a format which conditions the method of publication of the information they contain. Each household or business data collection project includes a dissemination platform for its implementation. Thus, these dissemination methods previously used, do not promote rapid access to information and especially does not offer the option of being able to link data for in-depth processing. In this paper, we present an approach to modeling these data to publish them in a format intended for the Semantic Web. Our objective is to be able to publish all this data in a single platform and offer the option to link with other external data sources. An application of the approach will be made on data from major national surveys such as the one on employment, poverty, child labor and the general census of the population of Senegal.

Keywords: Semantic Web, linked open data, database, statistic

Procedia PDF Downloads 173
12422 The Problem of Now in Special Relativity Theory

Authors: Mogens Frank Mikkelsen

Abstract:

Special Relativity Theory (SRT) includes only one characteristic of light, the speed is equal to all observers, and by excluding other relevant characteristics of light, the common interpretation of SRT should be regarded as merely an approximative theory. By rethinking the iconic double light cones, a revised version of SRT can be developed. The revised concept of light cones acknowledges an asymmetry of past and future light cones and introduced a concept of the extended past to explain the predictions as something other than the future. Combining this with the concept of photon-paired events, led to the inference that Special Relativity theory can support the existence of Now.

Keywords: relativity, light cone, Minkowski, time

Procedia PDF Downloads 79
12421 The Effect of Perceived Organizational Support and Leader Member Exchange on Turnover Intention: A Field Study in the Healthcare Industry

Authors: Mehtap Öztürk, Adem Öğüt, Emine Öğüt

Abstract:

Leader member exchange is considered as relationship-based approach to leadership. The focal point of this theory is that effective leadership processes occur when leaders and followers are able to develop mature leadership relationships and thus gain access to a variety of benefits these relationships bring. In this context, it can be claimed that the quality of leader member exchange appears to have a strong affect on perceived organizational support and reduce turnover intention. The purpose of this study is to determine the relationship between the levels of leader member exchange, perceived organizational support and turnover intention on the employees of a health institution operating in the province of Konya. A field study based on survey method on 134 physicians who are employees of a health institution operating in the mentioned sample. In accordance with this purpose, it has been observed that there is a negative and statistically significant relationship between leader member exchange and turnover intention. Furthermore, it has been also realized that there is a negative and statistically significant relationship between perceived organizational support and turnover intention.

Keywords: leader member exchange, perceived organizational support, social exchange theory, turnover intention

Procedia PDF Downloads 355
12420 Cybersecurity Protective Behavior in Industrial Revolution 4.0 Era: A Conceptual Framework

Authors: Saif Hussein Abdallah Alghazo, Norshima Humaidi

Abstract:

Adopting cybersecurity protective behaviour among the employees is seriously considered in the organization, especially when the Internet of Things (IoT) is widely used in Industrial Revolution 4.0 (IR 4.0) era. Cybersecurity issues arise due to weaknesses of employees’ behaviour such as carelessness and failure to adopt good practices of information security behaviour. Therefore, this study aims to explore the dimensions that might influence employees’ behaviour to adopt good cybersecurity practices and to develop a new holistic model related to this concept. The study proposed this by reviewing the existing works of literature related to this field extensively, especially by focusing on the existing theory such as Protection Motivation Theory (PMT). Moreover, this study has also explored the role of cybersecurity competency among the security manager in the organization since this construct is essential to enhance the protective behaviour towards cybersecurity among the employees in the organization. The proposed research model is important to be quantitatively tested in the future as the findings will serve as the input to the act that will enhance employee’s cybersecurity protective behaviour in the IR 4.0 environment.

Keywords: cybersecurity protective behaviour, protection motivation theory, IR 4.0, cybersecurity competency

Procedia PDF Downloads 146
12419 Magnetic Field Generation in Inhomogeneous Plasma via Ponderomotive Force

Authors: Fatemeh Shahi, Mehdi Sharifian, Laia Shahrassai, Elham Eskandari A.

Abstract:

A new mechanism is reported here for magnetic field generation in laser-plasma interaction by means of nonlinear ponderomotive force. The plasma considered here is unmagnetized inhomogeneous plasma with an exponentially decreasing profile. A damped periodic magnetic field with a relatively lower frequency is obtained using the ponderomotive force exerted on plasma electrons. Finally, with an electric field and by using Faraday’s law, the magnetic field profile in the plasma has been obtained. Because of the negative exponential density profile, the generated magnetic field is relatively slowly oscillating and damped through the plasma.

Keywords: magnetic field generation, laser-plasma interaction, ponderomotive force, inhomogeneous plasma

Procedia PDF Downloads 289
12418 Optimized Dynamic Bayesian Networks and Neural Verifier Test Applied to On-Line Isolated Characters Recognition

Authors: Redouane Tlemsani, Redouane, Belkacem Kouninef, Abdelkader Benyettou

Abstract:

In this paper, our system is a Markovien system which we can see it like a Dynamic Bayesian Networks. One of the major interests of these systems resides in the complete training of the models (topology and parameters) starting from training data. The Bayesian Networks are representing models of dubious knowledge on complex phenomena. They are a union between the theory of probability and the graph theory in order to give effective tools to represent a joined probability distribution on a set of random variables. The representation of knowledge bases on description, by graphs, relations of causality existing between the variables defining the field of study. The theory of Dynamic Bayesian Networks is a generalization of the Bayesians networks to the dynamic processes. Our objective amounts finding the better structure which represents the relationships (dependencies) between the variables of a dynamic bayesian network. In applications in pattern recognition, one will carry out the fixing of the structure which obliges us to admit some strong assumptions (for example independence between some variables).

Keywords: Arabic on line character recognition, dynamic Bayesian network, pattern recognition, networks

Procedia PDF Downloads 614
12417 Existence of Rational Primitive Normal Pairs with Prescribed Norm and Trace

Authors: Soniya Takshak, R. K. Sharma

Abstract:

Let q and n be positive integers, then Fᵩ denotes the finite field of q elements, and Fqn denotes the extension of Fᵩ of degree n. Also, Fᵩ* represents the multiplicative group of non-zero elements of Fᵩ, and the generators of Fᵩ* are called primitive elements. A normal element α of a finite field Fᵩⁿ is such that {α, αᵠ, . . . , αᵠⁿ⁻¹} forms a basis for Fᵩⁿ over Fᵩ. Primitive normal elements have several applications in coding theory and cryptography. So, establishing the existence of primitive normal elements under certain conditions is both theoretically important and a natural issue. In this article, we provide a sufficient condition for the existence of a primitive normal element α in Fᵩⁿ of a prescribed primitive norm and non-zero trace over Fᵩ such that f(α) is also primitive, where f(x) ∈ Fᵩⁿ(x) is a rational function of degree sum m. Particularly, we investigated the rational functions of degree sum 4 over Fᵩⁿ, where q = 11ᵏ and demonstrated that there are only 3 exceptional pairs (q, n), n ≥ 7 for which such kind of primitive normal elements may not exist. In general, we show that such elements always exist except for finitely many choices of (q, n). To arrive to our conclusion, we used additive and multiplicative character sums.

Keywords: finite field, primitive element, normal element, norm, trace, character

Procedia PDF Downloads 97
12416 Study on Robot Trajectory Planning by Robot End-Effector Using Dual Curvature Theory of the Ruled Surface

Authors: Y. S. Oh, P. Abhishesh, B. S. Ryuh

Abstract:

This paper presents the method of trajectory planning by the robot end-effector which accounts for more accurate and smooth differential geometry of the ruled surface generated by tool line fixed with end-effector based on the methods of curvature theory of ruled surface and the dual curvature theory, and focuses on the underlying relation to unite them for enhancing the efficiency for trajectory planning. Robot motion can be represented as motion properties of the ruled surface generated by trajectory of the Tool Center Point (TCP). The linear and angular properties of the six degree-of-freedom motion of end-effector are computed using the explicit formulas and functions from curvature theory and dual curvature theory. This paper explains the complete dualization of ruled surface and shows that the linear and angular motion applied using the method of dual curvature theory is more accurate and less complex.

Keywords: dual curvature theory, robot end effector, ruled surface, TCP (Tool Center Point)

Procedia PDF Downloads 359
12415 N400 Investigation of Semantic Priming Effect to Symbolic Pictures in Text

Authors: Thomas Ousterhout

Abstract:

The purpose of this study was to investigate if incorporating meaningful pictures of gestures and facial expressions in short sentences of text could supplement the text with enough semantic information to produce and N400 effect when probe words incongruent to the picture were subsequently presented. Event-related potentials (ERPs) were recorded from a 14-channel commercial grade EEG headset while subjects performed congruent/incongruent reaction time discrimination tasks. Since pictures of meaningful gestures have been shown to be semantically processed in the brain in a similar manner as words are, it is believed that pictures will add supplementary information to text just as the inclusion of their equivalent synonymous word would. The hypothesis is that when subjects read the text/picture mixed sentences, they will process the images and words just like in face-to-face communication and therefore probe words incongruent to the image will produce an N400.

Keywords: EEG, ERP, N400, semantics, congruency, facilitation, Emotiv

Procedia PDF Downloads 253
12414 Codifying the Creative Self: Conflicts of Theory and Content in Creative Writing

Authors: Danielle L. Iamarino

Abstract:

This paper explores the embattled territory of academic creative writing—and most focally, the use of critical theory in the teaching and structuring of creative practice. It places creative writing in contemporary social, cultural, and otherwise anthropological contexts, and evaluates conventional creative writing pedagogies based on how well they serve the updated needs of increasingly diverse student congregations. With continued emphasis on student-centered learning, this paper compares theoretical to practical applications of discipline-specific knowledge, examining and critiquing theory in terms of its relevance, accessibility, and whether or not it is both actionable and beneficial in the creative writing classroom.

Keywords: creative writing, literary theory, content, pedagogy, workshop, teaching

Procedia PDF Downloads 330
12413 Modeling Pronunciations of Arab Broca’s Aphasics Using Mosstalk Words Technique

Authors: Sadeq Al Yaari, Fayza Alhammadi, Ayman Al Yaari, Montaha Al Yaari, Aayah Al Yaari, Adham Al Yaari, Sajedah Al Yaari, Saleh Al Yami

Abstract:

Background: There has been a debate in the literature over the years as to whether or not MossTalk Words program fits Arab Broca’s aphasics (BAs) due to that language differences and also the fact that the technique has not yet been used for aphasics with semantic dementia (SD aphasics). Aims: To oversimplify the above mentioned debate slightly for purposes of exposition, the purpose of the present study is to investigate the “usability” of this program as well as pictures and community as therapeutic techniques for both Arab BAs and SD aphasics. Method: The subjects of this study are two Saudi aphasics (53 and 57 years old, respectively). The former suffers from Broca’s aphasia due to a stroke, while the latter suffers from semantic dementia. Both aphasics can speak English and have used the Moss Talk Words program in addition to intensive picture-naming therapeutic sessions for two years. They were tested by one of the researchers four times (a time per six months). The families of the two subjects, in addition to their relatives and friends, played a major part in all therapeutic sessions. Conclusion: Results show that in averages across the entire therapeutic sessions, MossTalk Words program was clearly found more effective in modeling BAs’ pronunciation than that of SD aphasic. Furthermore, picture-naming intensive exercises in addition to the positive role of the community members played a major role in the progress of the two subjects’ performance.

Keywords: moss talk words, program, technique, Broca’s aphasia, semantic dementia, subjects, picture, community

Procedia PDF Downloads 38
12412 Research Analysis in Eclectic Theory (Kaboudan and Sfandiar)

Authors: Farideh Alizadeh, Mohd Nasir Hashi

Abstract:

Present research investigates eclecticism in Iranian theatre on the basis of eclectic theory. Eclectic theatre is a new theory in postmodernism. The theory appeared during 60th – 70th century in some theatres such as “Conference of the Birds”. Special theatrical forms have been developed in many geographical- cultural areas of the world and are indigenous to that area. These forms, as compared with original forms, are considered to be traditional while being comprehensive, the form is considered to be national. Kaboudan and Sfandiar theatre has been influenced by elements of traditional form of Iran.

Keywords: eclectic theatre, theatrical forms, tradition, play

Procedia PDF Downloads 386
12411 Impact of Natural and Artificial Disasters, Lackadaisical and Semantic Approach in Risk Management, and Mitigation Implication for Sustainable Goals in Nigeria, from 2009 to 2022

Authors: Wisdom Robert Duruji, Moses Kanayochukwu Ifoh, Efeoghene Edward Esiemunobo

Abstract:

This study examines the impact of natural and artificial disasters, lackadaisical and semantic approach in risk management, and mitigation implication for sustainable development goals in Nigeria, from 2009 to 2022. The study utilizes a range of research methods to achieve its objectives. These include literature review, website knowledge, Google search, news media information, academic journals, field-work and on-site observations. These diverse methods allow for a comprehensive analysis on the impact and the implications being study. The study finds that paradigm shift from remediating seismic, flooding, environmental pollution and degradation natural disasters by Nigeria Emergency Management Agency (NEMA), to political and charity organization; has plunged risk reduction strategies to embezzling opportunities. However, this lackadaisical and semantic approach in natural disaster mitigation, invariably replicates artificial disasters in Nigeria through: Boko Haram terrorist organization, Fulani herdsmen and farmers conflicts, political violence, kidnapping for ransom, ethnic conflicts, Religious dichotomy, insurgency, secession protagonists, unknown-gun-men, and banditry. This study also, finds that some Africans still engage in self-imposed slavery through human trafficking, by nefariously stow-away to Europe; through Libya, Sahara desert and Mediterranean sea; in search for job opportunities, due to ineptitude in governance by their leaders; a perilous journey that enhanced artificial disasters in Nigeria. That artificial disaster fatality in Nigeria increased from about 5,655 in 2009 to 114,318 in 2018; and to 157,643 in 2022. However, financial and material loss of about $9.29 billion was incurred in Nigeria due to natural disaster, while about $70.59 billion was accrued due to artificial disaster; from 2009 to 2018. Although disaster risk mitigation and politics can synergistically support sustainable development goals; however, they are different entities, and need for distinct separations in Nigeria, as in reality and perception. This study concluded that referendum should be conducted in Nigeria, to ascertain its current status as a nation. Therefore it is recommended that Nigerian governments should refine its naturally endowed crude oil locally; to end fuel subsidy scam, corruption and poverty in Nigeria!

Keywords: corruption, crude oil, environmental risk analysis, Nigeria, referendum, terrorism

Procedia PDF Downloads 40
12410 A Supervised Face Parts Labeling Framework

Authors: Khalil Khan, Ikram Syed, Muhammad Ehsan Mazhar, Iran Uddin, Nasir Ahmad

Abstract:

Face parts labeling is the process of assigning class labels to each face part. A face parts labeling method (FPL) which divides a given image into its constitutes parts is proposed in this paper. A database FaceD consisting of 564 images is labeled with hand and make publically available. A supervised learning model is built through extraction of features from the training data. The testing phase is performed with two semantic segmentation methods, i.e., pixel and super-pixel based segmentation. In pixel-based segmentation class label is provided to each pixel individually. In super-pixel based method class label is assigned to super-pixel only – as a result, the same class label is given to all pixels inside a super-pixel. Pixel labeling accuracy reported with pixel and super-pixel based methods is 97.68 % and 93.45% respectively.

Keywords: face labeling, semantic segmentation, classification, face segmentation

Procedia PDF Downloads 251
12409 Linguistic Insights Improve Semantic Technology in Medical Research and Patient Self-Management Contexts

Authors: William Michael Short

Abstract:

Semantic Web’ technologies such as the Unified Medical Language System Metathesaurus, SNOMED-CT, and MeSH have been touted as transformational for the way users access online medical and health information, enabling both the automated analysis of natural-language data and the integration of heterogeneous healthrelated resources distributed across the Internet through the use of standardized terminologies that capture concepts and relationships between concepts that are expressed differently across datasets. However, the approaches that have so far characterized ‘semantic bioinformatics’ have not yet fulfilled the promise of the Semantic Web for medical and health information retrieval applications. This paper argues within the perspective of cognitive linguistics and cognitive anthropology that four features of human meaning-making must be taken into account before the potential of semantic technologies can be realized for this domain. First, many semantic technologies operate exclusively at the level of the word. However, texts convey meanings in ways beyond lexical semantics. For example, transitivity patterns (distributions of active or passive voice) and modality patterns (configurations of modal constituents like may, might, could, would, should) convey experiential and epistemic meanings that are not captured by single words. Language users also naturally associate stretches of text with discrete meanings, so that whole sentences can be ascribed senses similar to the senses of words (so-called ‘discourse topics’). Second, natural language processing systems tend to operate according to the principle of ‘one token, one tag’. For instance, occurrences of the word sound must be disambiguated for part of speech: in context, is sound a noun or a verb or an adjective? In syntactic analysis, deterministic annotation methods may be acceptable. But because natural language utterances are typically characterized by polyvalency and ambiguities of all kinds (including intentional ambiguities), such methods leave the meanings of texts highly impoverished. Third, ontologies tend to be disconnected from everyday language use and so struggle in cases where single concepts are captured through complex lexicalizations that involve profile shifts or other embodied representations. More problematically, concept graphs tend to capture ‘expert’ technical models rather than ‘folk’ models of knowledge and so may not match users’ common-sense intuitions about the organization of concepts in prototypical structures rather than Aristotelian categories. Fourth, and finally, most ontologies do not recognize the pervasively figurative character of human language. However, since the time of Galen the widespread use of metaphor in the linguistic usage of both medical professionals and lay persons has been recognized. In particular, metaphor is a well-documented linguistic tool for communicating experiences of pain. Because semantic medical knowledge-bases are designed to help capture variations within technical vocabularies – rather than the kinds of conventionalized figurative semantics that practitioners as well as patients actually utilize in clinical description and diagnosis – they fail to capture this dimension of linguistic usage. The failure of semantic technologies in these respects degrades the efficiency and efficacy not only of medical research, where information retrieval inefficiencies can lead to direct financial costs to organizations, but also of care provision, especially in contexts of patients’ self-management of complex medical conditions.

Keywords: ambiguity, bioinformatics, language, meaning, metaphor, ontology, semantic web, semantics

Procedia PDF Downloads 127
12408 Site Selection and Construction Mechanism of the Island Settlements in China Based on CFD-GIS Technology

Authors: Weng Jiantao, Wu Yiqun

Abstract:

The efficiency of natural ventilation, wind pressure distribution on building surface, wind comfort for pedestrians and buildings’ wind tolerance in traditional settlements are closely related to the pattern of terrain. On the basis of field research on the typical island terrain in China, the physical and mathematical models are established by using CFD software, and then the simulation results of the wind field are exported. We discuss the relationship between wind direction and wind field results. Furthermore simulation results are imported into ArcGIS platform. The evaluation model of island site selection is established with considering slope factor. We realize the visual model of site selection on complex island terrain. The multi-plans of certain residential are discussed based on wind simulation; at last the optimal project is selected. Results can provide the theory guidance for settlement planning and construction in China's traditional island.

Keywords: CFD, island terrain, site selection, construction mechanism

Procedia PDF Downloads 504
12407 Capital Punishment as a Contradiction to International Law and Indonesian Constitution

Authors: Akbar

Abstract:

Pros and cons of the capital punishment in Indonesia have been out of the date. The discourse of capital punishment has no relevance to the theory of punishment and theories of cultural relativism. In fact, the provisions of exceptions to the right to life by administering the death penalty against the perpetrators of serious crimes in Indonesia is a narrow perspective that does not pay attention to the development of the punishment of the crime. This thing is aggravated by an error to understand the natural right and legal right where the prohibition of those rights is result from a failure to distinguish the characteristic of the rights and to remember the raison d’être of law. To parse the irrational above, this paper will try to analyze normatively the error referring to the complementary theory between the sources of international law and the sources of municipal law of Indonesia. Both sources of the law above should be understood in the mutually reinforcing relationship enforceability because of false perceptions against those will create the disintegration between international law and municipal law of Indonesia. This disintegration is explicit not only contrary to the integrative theory of international law but also integrative theory of municipal law of Indonesia.

Keywords: capital punishment, municipal law, right to life, international law, the raison d’être of law, complementary theory, integrative theory

Procedia PDF Downloads 334
12406 A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field

Authors: Tun Myat Aung, Ni Ni Hla

Abstract:

This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. We study the general common attacks on elliptic curve discrete logarithm problem such as the Baby Step, Giant Step method, Pollard’s rho method and Pohlig-Hellman method, and describe in detail experiments of these attacks over prime field and binary field. The paper finishes by describing expected running time of the attacks and suggesting strong elliptic curves that are not susceptible to these attacks.c

Keywords: discrete logarithm problem, general attacks, elliptic curve, prime field, binary field

Procedia PDF Downloads 228