Search results for: digital images
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4774

Search results for: digital images

1894 Language and the Politics of Feminism through the Lens of Ba’s ‘So Long a Letter’ and Alkali’s ‘The Stillborn’

Authors: Jummai Aliyu Mohammed

Abstract:

The Sapir-Whorfian hypothesis postulates that the structure of a language determines the way in which species of that language view the world. It also states that the culture of a people finds reflection in their language. Consequently language becomes a vehicle of thought; a channel through which negative stereotypes of women is created and also one through which such images are dispelled. Women are generally portrayed as weaker vessels and inferior to men; a position which draws a counter reaction from women through their writings. In their writings, they attempt to reinvent womanhood and liberate the woman from the hitherto negative light they were portrayed. This position best describes the term feminism which argues that women be given equal rights in all spheres of life as men. This paper attempts to evaluate Ba’s ‘So Long a Letter’ and Alkali’s ‘The Stillborn’ with the view to identify the relationship between language and feminism. In evaluating this relationship, the paper concludes that there are several factors responsible for the variation in the speech pattern of male and female. All of these factors favour the male gender and further condemns the woman to oppression. Although the writers come from two different cultural backgrounds, the works amplify feminism and captured them as apostles of feminism.

Keywords: feminism, language, politics, Sapir-Whorfian hypothesis

Procedia PDF Downloads 167
1893 Isothermal Crystallization Kinetics of Lauric Acid Methyl Ester from DSC Measurements

Authors: Charine Faith H. Lagrimas, Rommel N. Galvan, Rizalinda L. de Leon

Abstract:

An ongoing study, methyl laurate to be used as a refrigerant in an HVAC system, requires the crystallization kinetics of the said substance. Step-wise and normal forms of Avrami model parameters were used to describe the isothermal crystallization kinetics of methyl laurate at different temperatures from Differential Scanning Calorimetry (DSC) measurements. At 3 °C, parameters showed that methyl laurate exhibits a secondary crystallization. The primary crystallization occurred with instantaneous nuclei and spherulitic growth; followed by a secondary instantaneous nucleation with a lower growth of dimensionality, rod-like. At 4 °C to 6 °C, the exotherms from DSC implied that the system was under the isokinetic range. The kinetics behavior is the same which is instantaneous nucleation with one-dimensional growth. The differences for the isokinetic range temperatures are the activation energies (directly proportional to T) and nucleation rates (inversely proportional to T). From the images obtained during the crystallization of methyl laurate using an optical microscope, it is confirmed that the nucleation and crystal growth modes obtained from the optical microscope are consistent with the parameters from Avrami model.

Keywords: Avrami model, isothermal crystallization, lipids kinetics, methyl laurate

Procedia PDF Downloads 333
1892 Training of Future Computer Science Teachers Based on Machine Learning Methods

Authors: Meruert Serik, Nassipzhan Duisegaliyeva, Danara Tleumagambetova

Abstract:

The article highlights and describes the characteristic features of real-time face detection in images and videos using machine learning algorithms. Students of educational programs reviewed the research work "6B01511-Computer Science", "7M01511-Computer Science", "7M01525- STEM Education," and "8D01511-Computer Science" of Eurasian National University named after L.N. Gumilyov. As a result, the advantages and disadvantages of Haar Cascade (Haar Cascade OpenCV), HoG SVM (Histogram of Oriented Gradients, Support Vector Machine), and MMOD CNN Dlib (Max-Margin Object Detection, convolutional neural network) detectors used for face detection were determined. Dlib is a general-purpose cross-platform software library written in the programming language C++. It includes detectors used for determining face detection. The Cascade OpenCV algorithm is efficient for fast face detection. The considered work forms the basis for the development of machine learning methods by future computer science teachers.

Keywords: algorithm, artificial intelligence, education, machine learning

Procedia PDF Downloads 68
1891 Advancing Agriculture through Technology: An Abstract of Research Findings

Authors: Eugene Aninagyei-Bonsu

Abstract:

Introduction: Agriculture has been a cornerstone of human civilization, ensuring food security and livelihoods for billions of people worldwide. In recent decades, rapid advancements in technology have revolutionized the agricultural sector, offering innovative solutions to enhance productivity, sustainability, and efficiency. This abstract summarizes key findings from a research study that explores the impacts of technology in modern agriculture and its implications for future food production systems. Methodologies: The research study employed a mixed-methods approach, combining quantitative data analysis with qualitative interviews and surveys to gain a comprehensive understanding of the role of technology in agriculture. Data was collected from various stakeholders, including farmers, agricultural technicians, and industry experts, to capture diverse perspectives on the adoption and utilization of agricultural technologies. The study also utilized case studies and literature reviews to contextualize the findings within the broader agricultural landscape. Major Findings: The research findings reveal that technology plays a pivotal role in transforming traditional farming practices and driving innovation in agriculture. Advanced technologies such as precision agriculture, drone technology, genetic engineering, and smart irrigation systems have significantly improved crop yields, reduced environmental impact, and optimized resource utilization. Farmers who have embraced these technologies have reported increased productivity, enhanced profitability, and improved resilience to environmental challenges. Furthermore, the study highlights the importance of accessible and affordable technology solutions for smallholder farmers in developing countries. Mobile applications, sensor technologies, and digital platforms have enabled small-scale farmers to access market information, weather forecasts, and agricultural best practices, empowering them to make informed decisions and improve their livelihoods. The research emphasizes the need for targeted policies and investments to bridge the digital divide and promote equitable technology adoption in agriculture. Conclusion: In conclusion, this research underscores the transformative potential of technology in agriculture and its critical role in advancing sustainable food production systems. The findings suggest that harnessing technology can address key challenges facing the agricultural sector, including climate change, resource scarcity, and food insecurity. By embracing innovation and leveraging technology, farmers can enhance their productivity, profitability, and resilience in a rapidly evolving global food system. Moving forward, policymakers, researchers, and industry stakeholders must collaborate to facilitate the adoption of appropriate technologies, support capacity building, and promote sustainable agricultural practices for a more resilient and food-secure future.

Keywords: technology development in modern agriculture, the influence of information technology access in agriculture, analyzing agricultural technology development, analyzing of the frontier technology of agriculture loT

Procedia PDF Downloads 19
1890 Mobile Device Applications in Physical Education: Investigating New Pedagogical Possibilities

Authors: Danica Vidotto

Abstract:

Digital technology is continuing to disrupt and challenge local conventions of teaching and education. As mobile devices continue to make their way into contemporary classrooms, educators need new pedagogies incorporating information communication technology to help reform the learning environment. In physical education, however, this can seem controversial as physical inactivity is often related to an excess of screen-time. This qualitative research project is an investigation on how physical educators use mobile device applications (apps) in their pedagogy and to what end. A comprehensive literature review is included to examine and engage current academic research of new pedagogies and technology, and their relevance to physical activity. Data were collected through five semi-structured interviews resulting in three overarching themes; i) changing pedagogies in physical education; ii) the perceived benefits and experienced challenges of using apps; and iii) apps, physical activity, and physical education. This study concludes with a discussion of the findings engaging the literature, discussing the implications of findings, and recommendations for future research.

Keywords: applications (apps), mobile devices, new pedagogies, physical education

Procedia PDF Downloads 191
1889 i2kit: A Tool for Immutable Infrastructure Deployments

Authors: Pablo Chico De Guzman, Cesar Sanchez

Abstract:

Microservice architectures are increasingly in distributed cloud applications due to the advantages on the software composition, development speed, release cycle frequency and the business logic time to market. On the other hand, these architectures also introduce some challenges on the testing and release phases of applications. Container technology solves some of these issues by providing reproducible environments, easy of software distribution and isolation of processes. However, there are other issues that remain unsolved in current container technology when dealing with multiple machines, such as networking for multi-host communication, service discovery, load balancing or data persistency (even though some of these challenges are already solved by traditional cloud vendors in a very mature and widespread manner). Container cluster management tools, such as Kubernetes, Mesos or Docker Swarm, attempt to solve these problems by introducing a new control layer where the unit of deployment is the container (or the pod — a set of strongly related containers that must be deployed on the same machine). These tools are complex to configure and manage and they do not follow a pure immutable infrastructure approach since servers are reused between deployments. Indeed, these tools introduce dependencies at execution time for solving networking or service discovery problems. If an error on the control layer occurs, which would affect running applications, specific expertise is required to perform ad-hoc troubleshooting. As a consequence, it is not surprising that container cluster support is becoming a source of revenue for consulting services. This paper presents i2kit, a deployment tool based on the immutable infrastructure pattern, where the virtual machine is the unit of deployment. The input for i2kit is a declarative definition of a set of microservices, where each microservice is defined as a pod of containers. Microservices are built into machine images using linuxkit —- a tool for creating minimal linux distributions specialized in running containers. These machine images are then deployed to one or more virtual machines, which are exposed through a cloud vendor load balancer. Finally, the load balancer endpoint is set into other microservices using an environment variable, providing service discovery. The toolkit i2kit reuses the best ideas from container technology to solve problems like reproducible environments, process isolation, and software distribution, and at the same time relies on mature, proven cloud vendor technology for networking, load balancing and persistency. The result is a more robust system with no learning curve for troubleshooting running applications. We have implemented an open source prototype that transforms i2kit definitions into AWS cloud formation templates, where each microservice AMI (Amazon Machine Image) is created on the fly using linuxkit. Even though container cluster management tools have more flexibility for resource allocation optimization, we defend that adding a new control layer implies more important disadvantages. Resource allocation is greatly improved by using linuxkit, which introduces a very small footprint (around 35MB). Also, the system is more secure since linuxkit installs the minimum set of dependencies to run containers. The toolkit i2kit is currently under development at the IMDEA Software Institute.

Keywords: container, deployment, immutable infrastructure, microservice

Procedia PDF Downloads 175
1888 Internet Media and Public: A Report of a Mutual Deception

Authors: Safet Zejnullahu

Abstract:

The relationship between the public and media is more than meaningful. It has been a topic of discussion as early as the birth of the media. The 'magic box' called radio adapted and transformed by following the tastes and interests of the public. Television went a step further by complementing the magic sound of the magic box with photos/images. Newspapers informed the reader, but from time to time, they also provided them the room to express their opinions. The media-public report in the traditional media is a report of a mutual respect. Today, the report between media and public should be well defined. The goal of this paper is to analyze the history of the media-public relationship, with a special emphasis on the analysis of this relationship in media of the internet time. This paper seeks to prove that the internet media has created a completely new and thus far unknown relationship between the media and public. Through research, which includes an analysis of the media in Kosovo and Albania, it will be proven that the media of the internet time has elevated this relationship to a new level, with many unknowns in terms of the functioning and role of the media. The results and findings of the paper are related to the conclusion that from the relationship in which the roles of the media and the public are known, nowadays, this relationship goes beyond the known principle and rules and is more defined as a relationship of mutual deception. The media goes beyond the line of the humility of the public, and the public seeks to direct the content of the media. The media-public report in the internet-media is a report based on mutual attempt for fraud.

Keywords: media, public, report, humility, direction

Procedia PDF Downloads 163
1887 Stromal Vascular Fraction Regenerative Potential in a Muscle Ischemia/Reperfusion Injury Mouse Model

Authors: Anita Conti, Riccardo Ossanna, Lindsey A. Quintero, Giamaica Conti, Andrea Sbarbati

Abstract:

Ischemia/reperfusion (IR) injury induces muscle fiber atrophy and skeletal muscle fiber death with subsequently functionality loss. The heterogeneous pool of cells, especially mesenchymal stem cells, contained in the stromal vascular fraction (SVF) of adipose tissue could promote muscle fiber regeneration. To prevent SVF dispersion, it has been proposed the use of injectable biopolymers that work as cells carrier. A significant element of the extracellular matrix is hyaluronic acid (HA), which has been widely used in regenerative medicine as a cell scaffold given its biocompatibility, degradability, and the possibility of chemical functionalization. Connective tissue micro-fragments enriched with SVF obtained from mechanical disaggregation of adipose tissue were evaluated for IR muscle injury regeneration using low molecular weight HA as a scaffold. IR induction. Hindlimb ischemia was induced in 9 athymic nude mice through the clamping of the right quadriceps using a plastic band. Reperfusion was induced by cutting the plastic band after 3 hours of ischemic period. Contralateral (left) muscular tissue was used as healthy control. Treatment. Twenty-four hours after the IR induction, animals (n=3) were intramuscularly injected with 100 µl of SVF mixed with HA (SVF-HA). Animals treated with 100 µl of HA (n=3) and 100 µl saline solution (n=3) were used as control. Treatment monitoring. All animals were in vivo monitored by magnetic resonance imaging (MRI) at 5, 7, 14 and 18 days post-injury (dpi). High-resolution morphological T2 weighed, quantitative T2 map and Dynamic Contrast-Enhanced (DCE) images were acquired in order to assess the regenerative potential of SVF-HA treatment. Ex vivo evaluation. After 18 days from IR induction, animals were sacrificed, and the muscles were harvested for histological examination. At 5 dpi T2 high-resolution MR images clearly reveal the presence of an extensive edematous area due to IR damage for all groups identifiable as an increase of signal intensity (SI) of muscular and surrounding tissue. At 7 dpi, animals of the SVF-HA group showed a reduction of SI, and the T2relaxation time of muscle tissue of the HA-SVF group was 29±0.5ms, comparable with the T2relaxation time of contralateral muscular tissue (30±0.7ms). These suggest a reduction of edematous overflow and swelling. The T2relaxation time at 7dpi of HA and saline groups were 84±2ms and 90±5ms, respectively, which remained elevated during the rest of the study. The evaluation of vascular regeneration showed similar results. Indeed, DCE-MRI analysis revealed a complete recovery of muscular tissue perfusion after 14 dpi for the SVF-HA group, while for the saline and HA group, controls remained in a damaged state. Finally, the histological examination of SVF-HA treated animals exhibited well-defined and organized fibers morphology with a lateralized nucleus, similar to contralateral healthy muscular tissue. On the contrary, HA and saline-treated animals presented inflammatory infiltrates, with HA slightly improving the diameter of the fibers and less degenerated tissue. Our findings show that connective tissue micro-fragments enriched with SVF induce higher muscle homeostasis and perfusion restoration in contrast to control groups.

Keywords: ischemia/reperfusion injury, regenerative medicine, resonance imaging, stromal vascular fraction

Procedia PDF Downloads 118
1886 Reducing Flood Risk in a Megacity: Using Mobile Application and Value Capture for Flood Risk Prevention and Risk Reduction Financing

Authors: Dedjo Yao Simon, Takahiro Saito, Norikazu Inuzuka, Ikuo Sugiyama

Abstract:

The megacity of Abidjan is a coastal urban area where the number of floods reported and the associated impacts are on a rapid increase due to climate change, an uncontrolled urbanization, a rapid population increase, a lack of flood disaster mitigation and citizens’ awareness. The objective of this research is to reduce in the short and long term period, the human and socio-economic impact of the flood. Hydrological simulation is applied on free of charge global spatial data (digital elevation model, satellite-based rainfall estimate, landuse) to identify the flood-prone area and to map the risk of flood. A direct interview to a sample residents is used to validate the simulation results. Then a mobile application (Flood Locator) is prototyped to disseminate the risk information to the citizen. In addition, a value capture strategy is proposed to mobilize financial resource for disaster risk reduction (DRRf) to reduce the impact of the flood. The town of Cocody in Abidjan is selected as a case study area to implement this research. The mapping of the flood risk reveals that population living in the study area is highly vulnerable. For a 5-year flood, more than 60% of the floodplain is affected by a water depth of at least 0.5 meters; and more than 1000 ha with at least 5000 buildings are directly exposed. The risk becomes higher for a 50 and 100-year floods. Also, the interview reveals that the majority of the citizen are not aware of the risk and severity of flooding in their community. This shortage of information is overcome by the Flood Locator and by an urban flood database we prototype for accumulate flood data. Flood Locator App allows the users to view floodplain and depth on a digital map; the user can activate the GPS sensor of the mobile to visualize his location on the map. Some more important additional features allow the citizen user to capture flood events and damage information that they can send remotely to the database. Also, the disclosure of the risk information could result to a decrement (-14%) of the value of properties locate inside floodplain and an increment (+19%) of the value of property in the suburb area. The tax increment due to the higher tax increment in the safer area should be captured to constitute the DRRf. The fund should be allocated to the reduction of flood risk for the benefit of people living in flood-prone areas. The flood prevention system discusses in this research will minimize in the short and long term the direct damages in the risky area due to effective awareness of citizen and the availability of DRRf. It will also contribute to the growth of the urban area in the safer zone and reduce human settlement in the risky area in the long term. Data accumulated in the urban flood database through the warning app will contribute to regenerate Abidjan towards the more resilient city by means of risk avoidable landuse in the master plan.

Keywords: abidjan, database, flood, geospatial techniques, risk communication, smartphone, value capture

Procedia PDF Downloads 279
1885 Revealing Celtic and Norse Mythological Depths through Dragon Age’s Tattoos and Narratives

Authors: Charles W. MacQuarrie, Rachel R. Tatro Duarte

Abstract:

This paper explores the representation of medieval identity within the world of games such as Dragon Age, Elden Ring, Hellblade: Senua’s sacrifice, fantasy role-playing games that draw effectively and problematically on Celtic and Norse mythologies. Focusing on tattoos, onomastics, and accent as visual and oral markers of status and ethnicity, this study analyzes how the game's interplay between mythology, character narratives, and visual storytelling enriches the themes and offers players an immersive, but sometimes baldly ahistorical, connection to ancient mythologies and contemporary digital storytelling. Dragon Age is a triple a game series, Hellblade Senua’s Sacrifice, and Elden Ring of gamers worldwide with its presentation of an idealized medieval world, inspired by the lore of Celtic and Norse mythologies. This paper sets out to explore the intricate relationships between tattoos, accent, and character narratives in the game, drawing parallels to themes,heroic figures and gods from Celtic and Norse mythologies. Tattoos as Mythic and Ethnic Markers: This study analyzes how tattoos in Dragon Age visually represent mythological elements from both Celtic and Norse cultures, serving as conduits of cultural identity and narratives. The nature of these tattoos reflects the slave, criminal, warrior associations made in classical and medieval literature, and some of the episodes concerning tattoos in the games have either close analogs or sources in literature. For example the elvish character Solas, in Dragon Age Inquisition, removes a slave tattoo from the face of a lower status elf in an episode that is reminiscent of Bridget removing the stigmata from Connallus in the Vita Prima of Saint Bridget Character Narratives: The paper examines how characters' personal narratives in the game parallel the archetypal journeys of Celtic heroes and Norse gods, with a focus on their relationships to mythic themes. In these games the Elves usually have Welsh or Irish accents, are close to nature, magically powerful, oppressed by apparently Anglo-Saxon humans and Norse dwarves, and these elves wear facial tattoos. The Welsh voices of fairies and demons is older than the reference in Shakespeare’s Merry Wives of Windsor or even the Anglo-Saxon Life of Saint Guthlac. The English speaking world, and the fantasy genre of literature and gaming, undoubtedly driven by Tolkien, see Elves as Welsh speakers, and as having Welsh accents when speaking English Comparative Analysis: A comparative approach is employed to reveal connections, adaptations, and unique interpretations of the motifs of tattoos and narrative themes in Dragon Age, compared to those found in Celtic and Norse mythologies. Methodology: The study uses a comparative approach to examine the similarities and distinctions between Celtic and Norse mythologies and their counterparts in video games. The analysis encompasses character studies, narrative exploration, visual symbolism, and the historical context of Celtic and Norse cultures. Mythic Visuals: This study showcases how tattoos, as visual symbols, encapsulate mythic narratives, beliefs, and cultural identity, echoing Celtic and Norse visual motifs. Archetypal Journeys: The paper analyzes how character arcs mirror the heroic journeys of Celtic and Norse mythological figures, allowing players to engage with mythic narratives on a personal level. Cultural Interplay: The study discusses how the game's portrayal of tattoos and narratives both preserves and reinterprets elements from Celtic and Norse mythologies, fostering a connection between ancient cultures and modern digital storytelling. Conclusion: By exploring the interconnectedness of tattoos and character narratives in Dragon Age, this paper reveals the game series' ability to act as a bridge between ancient mythologies and contemporary gaming. By drawing inspiration from Celtic heroes and Norse gods and translating them into digital narratives and visual motifs, Dragon Age offers players a multi-dimensional engagement with mythic themes and a unique lens through which to appreciate the enduring allure of these cultures.

Keywords: comparative analysis, character narratives, video games and literature, tattoos, immersive storytelling, character development, mythological influences, Celtic mythology, Norset mythology

Procedia PDF Downloads 62
1884 Design of a Telemetry, Tracking, and Command Radio-Frequency Receiver for Small Satellites Based on Commercial Off-The-Shelf Components

Authors: A. Lovascio, A. D’Orazio, V. Centonze

Abstract:

From several years till now the aerospace industry is developing more and more small satellites for Low-Earth Orbit (LEO) missions. Such satellites have a low cost of making and launching since they have a size and weight smaller than other types of satellites. However, because of size limitations, small satellites need integrated electronic equipment based on digital logic. Moreover, the LEOs require telecommunication modules with high throughput to transmit to earth a big amount of data in a short time. In order to meet such requirements, in this paper we propose a Telemetry, Tracking & Command module optimized through the use of the Commercial Off-The-Shelf components. The proposed approach exploits the major flexibility offered by these components in reducing costs and optimizing the performance. The method has been applied in detail for the design of the front-end receiver, which has a low noise figure (1.5 dB) and DC power consumption (smaller than 2 W). Such a performance is particularly attractive since it allows fulfilling the energy budget stringent constraints that are typical for LEO small platforms.

Keywords: COTS, LEO, small-satellite, TT&C

Procedia PDF Downloads 125
1883 On-Line Impulse Buying and Cognitive Dissonance: The Moderating Role of the Positive Affective State

Authors: G. Mattia, A. Di Leo, L. Principato

Abstract:

The purchase impulsiveness is preceded by a lack of self-control: consequently, it is legitimate to believe that a consumer with a low level of self-control can result in a higher probability of cognitive dissonance. Moreover, the process of purchase is influenced by the pre-existing affective state in a considerable way. With reference to on-line purchases, digital behavior cannot be merely ascribed to the rational sphere, given the speed and ease of transactions and the hedonistic dimension of purchases. To our knowledge, this research is among the first cases of verification of the effect of moderation exerted by the positive affective state in the on-line impulse purchase of products with a high expressive value such as a smartphone on the occurrence of cognitive dissonance. To this aim, a moderation analysis was conducted on a sample of 212 impulsive millennials buyers. Three scales were adopted to measure the constructs of interest: IBTS for impulsivity, PANAS for the affective state, Sweeney for cognitive dissonance. The analysis revealed that positive affective state does not affect the onset of cognitive dissonance.

Keywords: cognitive dissonance, impulsive buying, online shopping, online consumer behavior

Procedia PDF Downloads 151
1882 Understanding the Role of Alkali-Free Accelerators in Wet-Mix Shotcrete

Authors: Ezgi Yurdakul, Klaus-Alexander Rieder, Richard Sibbick

Abstract:

Most of the shotcrete projects require compliance with meeting a specified early-age strength target (e.g., reaching 1 MPa in 1 hour) that is selected based on the underground conditions. To meet the desired early-age performance characteristics, accelerators are commonly used as they increase early-age strength development rate and accelerate the setting thereby reducing sagging and rebound. The selection of accelerator type and its dosage is made by the setting time and strength required for the shotcrete application. While alkaline and alkali-free accelerators are the two main types used in wet-mix shotcrete; alkali-free admixtures increasingly substitute the alkaline accelerators to improve the performance and working safety. This paper aims to evaluate the impact of alkali-free accelerators in wet-mix on various tests including set time, early and later-age compressive strength, boiled absorption, and electrical resistivity. Furthermore, the comparison between accelerated and non-accelerated samples will be made to demonstrate the interaction between cement and accelerators. Scanning electron microscopy (SEM), fluorescent resin impregnated thin section and cut and polished surface images will be used to understand the microstructure characterization of mixes in the presence of accelerators.

Keywords: accelerators, chemical admixtures, shotcrete, sprayed concrete

Procedia PDF Downloads 165
1881 Investigation of Chip Formation Characteristics during Surface Finishing of HDPE Samples

Authors: M. S. Kaiser, S. Reaz Ahmed

Abstract:

Chip formation characteristics are investigated during surface finishing of high density polyethylene (HDPE) samples using a shaper machine. Both the cutting speed and depth of cut are varied continually to enable observations under various machining conditions. The generated chips are analyzed in terms of their shape, size, and deformation. Their physical appearances are also observed using digital camera and optical microscope. The investigation shows that continuous chips are obtained for all the cutting conditions. It is observed that cutting speed is more influential than depth of cut to cause dimensional changes of chips. Chips curl radius is also found to increase gradually with the increase of cutting speed. The length of continuous chips remains always smaller than the job length, and the corresponding discrepancies are found to be more prominent at lower cutting speed. Microstructures of the chips reveal that cracks are formed at higher cutting speeds and depth of cuts, which is not that significant at low depth of cut.

Keywords: HDPE, surface-finishing, chip formation, deformation, roughness

Procedia PDF Downloads 142
1880 Quantification and Preference of Facial Asymmetry of the Sub-Saharan Africans' 3D Facial Models

Authors: Anas Ibrahim Yahaya, Christophe Soligo

Abstract:

A substantial body of literature has reported on facial symmetry and asymmetry and their role in human mate choice. However, major gaps persist, with nearly all data originating from the WEIRD (Western, Educated, Industrialised, Rich and Developed) populations, and results remaining largely equivocal when compared across studies. This study is aimed at quantifying facial asymmetry from the 3D faces of the Hausa of northern Nigeria and also aimed at determining their (Hausa) perceptions and judgements of standardised facial images with different levels of asymmetry using questionnaires. Data were analysed using R-studio software and results indicated that individuals with lower levels of facial asymmetry (near facial symmetry) were perceived as more attractive, more suitable as marriage partners and more caring, whereas individuals with higher levels of facial asymmetry were perceived as more aggressive. The study conclusively asserts that all faces are asymmetric including the most beautiful ones, and the preference of less asymmetric faces was not just dependent on single facial trait, but rather on multiple facial traits; thus the study supports that physical attractiveness is not just an arbitrary social construct, but at least in part a cue to general health and possibly related to environmental context.

Keywords: face, asymmetry, symmetry, Hausa, preference

Procedia PDF Downloads 190
1879 Lung Disease Detection from the Chest X Ray Images Using Various Transfer Learning

Authors: Aicha Akrout, Amira Echtioui, Mohamed Ghorbel

Abstract:

Pneumonia remains a significant global health concern, posing a substantial threat to human lives due to its contagious nature and potentially fatal respiratory complications caused by bacteria, fungi, or viruses. The reliance on chest X-rays for diagnosis, although common, often necessitates expert interpretation, leading to delays and potential inaccuracies in treatment. This study addresses these challenges by employing transfer learning techniques to automate the detection of lung diseases, with a focus on pneumonia. Leveraging three pre-trained models, VGG-16, ResNet50V2, and MobileNetV2, we conducted comprehensive experiments to evaluate their performance. Our findings reveal that the proposed model based on VGG-16 demonstrates superior accuracy, precision, recall, and F1 score, achieving impressive results with an accuracy of 93.75%, precision of 94.50%, recall of 94.00%, and an F1 score of 93.50%. This research underscores the potential of transfer learning in enhancing pneumonia diagnosis and treatment outcomes, offering a promising avenue for improving healthcare delivery and reducing mortality rates associated with this debilitating respiratory condition.

Keywords: chest x-ray, lung diseases, transfer learning, pneumonia detection

Procedia PDF Downloads 30
1878 Key Performance Indicators and the Model for Achieving Digital Inclusion for Smart Cities

Authors: Khalid Obaed Mahmod, Mesut Cevik

Abstract:

The term smart city has appeared recently and was accompanied by many definitions and concepts, but as a simplified and clear definition, it can be said that the smart city is a geographical location that has gained efficiency and flexibility in providing public services to citizens through its use of technological and communication technologies, and this is what distinguishes it from other cities. Smart cities connect the various components of the city through the main and sub-networks in addition to a set of applications and thus be able to collect data that is the basis for providing technological solutions to manage resources and provide services. The basis of the work of the smart city is the use of artificial intelligence and the technology of the Internet of Things. The work presents the concept of smart cities, the pillars, standards, and evaluation indicators on which smart cities depend, and the reasons that prompted the world to move towards its establishment. It also provides a simplified hypothetical way to measure the ideal smart city model by defining some indicators and key pillars, simulating them with logic circuits, and testing them to determine if the city can be considered an ideal smart city or not.

Keywords: factors, indicators, logic gates, pillars, smart city

Procedia PDF Downloads 141
1877 The Reach of Shopping Center Layout Form on Subway Based on Kernel Density Estimate

Authors: Wen Liu

Abstract:

With the rapid progress of modern cities, the railway construction must be developing quickly in China. As a typical high-density country, shopping center on the subway should be one important factor during the process of urban development. The paper discusses the influence of the layout of shopping center on the subway, and put it in the time and space’s axis of Shanghai urban development. We use the digital technology to establish the database of relevant information. And then get the change role about shopping center on subway in Shanghaiby the Kernel density estimate. The result shows the development of shopping center on subway has a relationship with local economic strength, population size, policy support, and city construction. And the suburbanization trend of shopping center would be increasingly significant. By this case research, we could see the Kernel density estimate is an efficient analysis method on the spatial layout. It could reveal the characters of layout form of shopping center on subway in essence. And it can also be applied to the other research of space form.

Keywords: Shanghai, shopping center on the subway, layout form, Kernel density estimate

Procedia PDF Downloads 308
1876 A Biologically Inspired Approach to Automatic Classification of Textile Fabric Prints Based On Both Texture and Colour Information

Authors: Babar Khan, Wang Zhijie

Abstract:

Machine Vision has been playing a significant role in Industrial Automation, to imitate the wide variety of human functions, providing improved safety, reduced labour cost, the elimination of human error and/or subjective judgments, and the creation of timely statistical product data. Despite the intensive research, there have not been any attempts to classify fabric prints based on printed texture and colour, most of the researches so far encompasses only black and white or grey scale images. We proposed a biologically inspired processing architecture to classify fabrics w.r.t. the fabric print texture and colour. We created a texture descriptor based on the HMAX model for machine vision, and incorporated colour descriptor based on opponent colour channels simulating the single opponent and double opponent neuronal function of the brain. We found that our algorithm not only outperformed the original HMAX algorithm on classification of fabric print texture and colour, but we also achieved a recognition accuracy of 85-100% on different colour and different texture fabric.

Keywords: automatic classification, texture descriptor, colour descriptor, opponent colour channel

Procedia PDF Downloads 476
1875 “Octopub”: Geographical Sentiment Analysis Using Named Entity Recognition from Social Networks for Geo-Targeted Billboard Advertising

Authors: Oussama Hafferssas, Hiba Benyahia, Amina Madani, Nassima Zeriri

Abstract:

Although data nowadays has multiple forms; from text to images, and from audio to videos, yet text is still the most used one at a public level. At an academical and research level, and unlike other forms, text can be considered as the easiest form to process. Therefore, a brunch of Data Mining researches has been always under its shadow, called "Text Mining". Its concept is just like data mining’s, finding valuable patterns in data, from large collections and tremendous volumes of data, in this case: Text. Named entity recognition (NER) is one of Text Mining’s disciplines, it aims to extract and classify references such as proper names, locations, expressions of time and dates, organizations and more in a given text. Our approach "Octopub" does not aim to find new ways to improve named entity recognition process, rather than that it’s about finding a new, and yet smart way, to use NER in a way that we can extract sentiments of millions of people using Social Networks as a limitless information source, and Marketing for product promotion as the main domain of application.

Keywords: textmining, named entity recognition(NER), sentiment analysis, social media networks (SN, SMN), business intelligence(BI), marketing

Procedia PDF Downloads 581
1874 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 155
1873 Overcoming the Challenges of Subjective Truths in the Post-Truth Age Through a CriticalEthical English Pedagogy

Authors: Farah Vierra

Abstract:

Following the 2016 US presidential election and the advancement of the Brexit referendum, the concept of “post-truth”, defined by Oxford Dictionary as “relating to or denoting circumstances in which objective facts are less influential in shaping public opinion than appeals to emotion and personal belief”, came into prominent use in public, political and educational circles. What this essentially entails is that in this age, individuals are increasingly confronted with subjective perpetuations of truth in their discourse spheres that are informed by beliefs and opinions as opposed to any form of coherence to the reality of those who these truth claims concern. In principle, a subjective delineation of truth is progressive and liberating – especially considering its potential in providing marginalised groups in the diverse communities of our globalised world with the voice to articulate truths that are representative of themselves and their experiences. However, any form of human flourishing that seems to be promised here collapses as the tenets of subjective truths initially in place to liberate has been distorted through post-truth to allow individuals to purport selective and individualistic truth claims that further oppress and silence certain groups within society without due accountability. The evidence of which is prevalent through the conception of terms such as "alternative facts" and "fake news" that we observe individuals declare when their problematic truth claims are questioned. Considering the pervasiveness of post-truth and the ethical issues that accompany it, educators and scholars alike have increasingly noted the need to adapt educational practices and pedagogies to account for the diminishing objectivity of truth in the twenty-first century, especially because students, as digital natives, find themselves in the firing line of post-truth; engulfed in digital societies that proliferate post-truth through the surge of truth claims allowed in various media sites. In an attempt to equip students with the vital skills to navigate the post-truth age and oppose its proliferation of social injustices, English educators find themselves having to devise instructional strategies that not only teach students the ways they can critically and ethically scrutinise truth claims but also teach them to mediate the subjectivity of truth in a manner that does not undermine the voices of diverse communities. In hopes of providing educators with the roadmap to do so, this paper will first examine the challenges that confront students as a result of post-truth. Following which, the paper will elucidate the role English education can play in helping students overcome the complex ramifications of post-truth. Scholars have consistently touted the affordances of literary texts in providing students with imagined spaces to explore societal issues through a critical discernment of language and an ethical engagement with its narrative developments. Therefore, this paper will explain and demonstrate how literary texts, when used alongside a critical-ethical post-truth pedagogy that equips students with interpretive strategies informed by literary traditions such as literary and ethical criticism, can be effective in helping students develop the pertinent skills to comprehensively examine truth claims and overcome the challenges of the post-truth age.

Keywords: post-truth, pedagogy, ethics, English, education

Procedia PDF Downloads 67
1872 'iTheory': Mobile Way to Music Fundamentals

Authors: Marina Karaseva

Abstract:

The beginning of our century became a new digital epoch in the educational situation. Last decade the newest stage of this process had been initialized by the touch-screen mobile devices with program applications for them. The touch possibilities for learning fundamentals of music are of especially importance for music majors. The phenomenon of touching, firstly, makes it realistic to play on the screen as on music instrument, secondly, helps students to learn music theory while listening in its sound elements by music ear. Nowadays we can detect several levels of such mobile applications: from the basic ones devoting to the elementary music training such as intervals and chords recognition, to the more advanced applications which deal with music perception of non-major and minor modes, ethnic timbres, and complicated rhythms. The main purpose of the proposed paper is to disclose the main tendencies in this process and to demonstrate the most innovative features of music theory applications on the base of iOS and Android systems as the most common used. Methodological recommendations how to use these digital material musicologically will be done for the professional music education of different levels. These recommendations are based on more than ten year ‘iTheory’ teaching experience of the author. In this paper, we try to logically classify all types of ‘iTheory’mobile applications into several groups, according to their methodological goals. General concepts given below will be demonstrated in concrete examples. The most numerous group of programs is formed with simulators for studying notes with audio-visual links. There are link-pair types as follows: sound — musical notation which may be used as flashcards for studying words and letters, sound — key, sound — string (basically, guitar’s). The second large group of programs is programs-tests containing a game component. As a rule, their basis is made with exercises on ear identification and reconstruction by voice: sounds and intervals on their sounding — harmonical and melodical, music modes, rhythmic patterns, chords, selected instrumental timbres. Some programs are aimed at an establishment of acoustical communications between concepts of the musical theory and their musical embodiments. There are also programs focused on progress of operative musical memory (with repeating of sounding phrases and their transposing in a new pitch), as well as on perfect pitch training In addition a number of programs improvisation skills have been developed. An absolute pitch-system of solmisation is a common base for mobile programs. However, it is possible to find also the programs focused on the relative pitch system of solfegе. In App Store and Google Play Market online store there are also many free programs-simulators of musical instruments — piano, guitars, celesta, violin, organ. These programs may be effective for individual and group exercises in ear training or composition classes. Great variety and good sound quality of these programs give now a unique opportunity to musicians to master their music abilities in a shorter time. That is why such teaching material may be a way to effective study of music theory.

Keywords: ear training, innovation in music education, music theory, mobile devices

Procedia PDF Downloads 202
1871 Reflectance Imaging Spectroscopy Data (Hyperspectral) for Mineral Mapping in the Orientale Basin Region on the Moon Surface

Authors: V. Sivakumar, R. Neelakantan

Abstract:

Mineral mapping on the Moon surface provides the clue to understand the origin, evolution, stratigraphy and geological history of the Moon. Recently, reflectance imaging spectroscopy plays a significant role in identifying minerals on the planetary surface in the Visible to NIR region of the electromagnetic spectrum. The Moon Mineralogy Mapper (M3) onboard Chandrayaan-1 provides unprecedented spectral data of lunar surface to study about the Moon surface. Here we used the M3 sensor data (hyperspectral imaging spectroscopy) for analysing mineralogy of Orientale basin region on the Moon surface. Reflectance spectrums were sampled from different locations of the basin and continuum was removed using ENvironment for Visualizing Images (ENVI) software. Reflectance spectra of unknown mineral composition were compared with known Reflectance Experiment Laboratory (RELAB) spectra for discriminating mineralogy. Minerals like olivine, Low-Ca Pyroxene (LCP), High-Ca Pyroxene (HCP) and plagioclase were identified. In addition to these minerals, an unusual type of spectral signature was identified, which indicates the probable Fe-Mg-spinel lithology in the basin region.

Keywords: chandryaan-1, moon mineralogy mapper, mineral, mare orientale, moon

Procedia PDF Downloads 384
1870 Implementation of ALD in Product Development: Study of ROPS to Improve Energy Absorption Performance Using Absorption Part

Authors: Zefry Darmawan, Shigeyuki Haruyama, Ken Kaminishi

Abstract:

Product development is a big issue in the industrial competition and takes a serious part in development of technology. Product development process could adapt high changes of market needs and transform into engineering concept in order to produce high-quality product. One of the latest methods in product development is Analysis-Led-Design (ALD). It utilizes digital engineering design tools with finite analysis to perform product robust analysis and valuable for product reliability assurance. Heavy machinery which operates under severe condition should maintain safety to the customer when faced with potential hazard. Cab frame should able to absorb the energy while collision. Through ALD, a series of improvement of cab frame to increase energy absorption was made and analyzed. Improvement was made by modifying shapes of frame and-or install absorption device in certain areas. Simulation result showed that install absorption device could increase absorption energy than modifying shape.

Keywords: ALD, ROPS, energy absorption, cab frame

Procedia PDF Downloads 368
1869 Statistical Shape Analysis of the Human Upper Airway

Authors: Ramkumar Gunasekaran, John Cater, Vinod Suresh, Haribalan Kumar

Abstract:

The main objective of this project is to develop a statistical shape model using principal component analysis that could be used for analyzing the shape of the human airway. The ultimate goal of this project is to identify geometric risk factors for diagnosis and management of Obstructive Sleep Apnoea (OSA). Anonymous CBCT scans of 25 individuals were obtained from the Otago Radiology Group. The airways were segmented between the hard-palate and the aryepiglottic fold using snake active contour segmentation. The point data cloud of the segmented images was then fitted with a bi-cubic mesh, and pseudo landmarks were placed to perform PCA on the segmented airway to analyze the shape of the airway and to find the relationship between the shape and OSA risk factors. From the PCA results, the first four modes of variation were found to be significant. Mode 1 was interpreted to be the overall length of the airway, Mode 2 was related to the anterior-posterior width of the retroglossal region, Mode 3 was related to the lateral dimension of the oropharyngeal region and Mode 4 was related to the anterior-posterior width of the oropharyngeal region. All these regions are subjected to the risk factors of OSA.

Keywords: medical imaging, image processing, FEM/BEM, statistical modelling

Procedia PDF Downloads 508
1868 When the Children Touched the Paintings: New German Cinema, the Red Army Faction, and their Filmic Afterlives

Authors: Rudy Ralph Martinez

Abstract:

The 1960s provided us with some of the most iconic protest images of the late-20th century. This was the result of worldwide unrest and the proliferation of filmmaking equipment, which led to a flood of photos and films depicting war and activism. Many of these images and films played a pivotal role in shaping the ever-evolving discussions surrounding the ‘60s. However, too often, radical imagery finds itself subsumed by consumer culture, a degradation that flattens radical imagery and turns it into consumer products. With this in mind, the work that follows is an analysis of one of the little-discussed chapters of the 60s and 70s, and it is that of the New German Cinema movement and its relationship with the Rote Armee Fraktion, or Red Army Faction (RAF), an armed Marxist-Leninist group founded in West Germany in 1970. The RAF arose out of a milieu which included student activists protesting Western military involvement in the Vietnam War, civil rights activists, and third world guerillas. The actions undertaken by the group throughout their first decade in existence, including bombings, and assassinations, would create West Germany’s most dire political crisis since the Nazi era, culminating in a crisis of legitimation remembered as the German Autumn, which saw the suicides of several of the militants and the assassination of SS officer-cum-prominent industrialist, Hans Martin-Schleyer. Throughout the 1970s, young filmmakers associated with the New German Cinema sought to analyze the political situation as it was unfolding, their films contributing to the public discourse in concomitance with the government and the media. Four notable examples of these films are Volker Schlöndorff and Margarethe von Trotta’sDie Verlorene Ehre der Katharina Blum oder: Wie Gewaltentstehen und wohinsieführenkann (The Lost Honour of Katharina Blum, or: How Violence Develops and Where it Can Lead) (1975), a dark drama about the media’s role in forming public opinion, Deutschland im Herbst(Germany in Autumn) (1977), an experimental collective work released mere months after the German Autumn, Rainer Werner Fassbinder’s Die Dritte Generation (The Third Generation) (1979), a satire about an inept cell of radical militants, and Die bleierne Zeit (The Leaden Time, alt. title: Marianne and Juliane) (1981), an intimate portrayal about two sisters whose activism leads them down disparate paths. The filmmakers of the New German Cinema refused to underline their films with the Manichaean claims respectively espoused by the RAF and the government. These complex portrayals found offspring in films such as Christian Petzold’s Die innere Sicherheit(The State I Am In) (2000), a portrait of a family on the run after the reunification of Germany but were countered by glossy high-budget portrayals such as Uli Edel’s Der Baader-Meinhof Komplex(The Baader-Meinhof Complex) (2008). In focusing on the aesthetic structure of these films in relation to the political atmosphere of the late-60s and 70s West Germany, I hope to shed light on questions concerning spectatorship, surveillance, the role of journalism, and how politics disrupts personal relationships, and the kinship between artists and so-called terrorists.

Keywords: new german cinema, film history, red army faction, german cinema

Procedia PDF Downloads 91
1867 Implementation of Elliptic Curve Cryptography Encryption Engine on a FPGA

Authors: Mohamad Khairi Ishak

Abstract:

Conventional public key crypto systems such as RSA (Ron Rivest, Adi Shamir and Leonard Adleman), DSA (Digital Signature Algorithm), and Elgamal are no longer efficient to be implemented in the small, memory constrained devices. Elliptic Curve Cryptography (ECC), which allows smaller key length as compared to conventional public key crypto systems, has thus become a very attractive choice for many applications. This paper describes implementation of an elliptic curve cryptography (ECC) encryption engine on a FPGA. The system has been implemented in 2 different key sizes, which are 131 bits and 163 bits. Area and timing analysis are provided for both key sizes for comparison. The crypto system, which has been implemented on Altera’s EPF10K200SBC600-1, has a hardware size of 5945/9984 and 6913/9984 of logic cells for 131 bits implementation and 163 bits implementation respectively. The crypto system operates up to 43 MHz, and performs point multiplication operation in 11.3 ms for 131 bits implementation and 14.9 ms for 163 bits implementation. In terms of speed, our crypto system is about 8 times faster than the software implementation of the same system.

Keywords: elliptic curve cryptography, FPGA, key sizes, memory

Procedia PDF Downloads 311
1866 Cascade Control for Pressure Calibration by Fieldbus Communication System

Authors: Chatchaval Pornpatkul, Wipawan Suksathid

Abstract:

This paper is to study and control the pressure of the water inside the open tank using a cascade control with the communication in the process by fieldbus system for the pressure calibration. The plant model is to be used in experiments to control the level and flow process of the water by using Syscon program to create functions. We used to control by Intouch runtime program to create the graphic display on the screen. In this case we used PI control the level and the flow process of water in the open tank in the range of 0 – 10 L/m. The output signal of the level and the flow transmitter are the digital standard signal by fieldbus system. And all information displayed on the computer with the communication between the computer and plant model can be communication to each other through just one cable pair. And in this paper, the PI tuning, we used calculate by Ziegler-Nichols reaction curve method to control the plant model by PI controller.

Keywords: cascade control, fieldbus system, pressure calibration, microelectronics systems

Procedia PDF Downloads 453
1865 Attendance Management System Implementation Using Face Recognition

Authors: Zainab S. Abdullahi, Zakariyya H. Abdullahi, Sahnun Dahiru

Abstract:

Student attendance in schools is a very important aspect in school management record. In recent years, security systems have become one of the most demanding systems in school. Every institute have its own method of taking attendance, many schools in Nigeria use the old fashion way of taking attendance. That is writing the students name and registration number in a paper and submitting it to the lecturer at the end of the lecture which is time-consuming and insecure, because some students can write for their friends without the lecturer’s knowledge. In this paper, we propose a system that takes attendance using face recognition. There are many automatic methods available for this purpose i.e. biometric attendance, but they all waste time, because the students have to follow a queue to put their thumbs on a scanner which is time-consuming. This attendance is recorded by using a camera attached in front of the class room and capturing the student images, detect the faces in the image and compare the detected faces with database and mark the attendance. The principle component analysis was used to recognize the faces detected with a high accuracy rate. The paper reviews the related work in the field of attendance system, then describe the system architecture, software algorithm and result.

Keywords: attendance system, face detection, face recognition, PCA

Procedia PDF Downloads 354