Search results for: Wan-Ting Liao
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 147

Search results for: Wan-Ting Liao

87 Self-Disclosure of Location: Influences of Personality Traits, Intrinsic Motivations and Extrinsic Motivations

Authors: Chechen Liao, Sheng Yi Lin

Abstract:

With the popularity of smartphone usage and the flourish of social networks, many people began to use the 'check-in' functions to share their location information and days of live and self-disclosure. In order to increase exposure and awareness, some stores provide discounts and other benefits to attract consumers to 'check-in' in their stores. The purpose of this study was to investigate whether personality traits, intrinsic motivations, extrinsic motivations, and privacy concerns would affect self-disclosure of location for consumers. Research data were collected from 407 individuals that have used Facebook check-in in Taiwan. This study used SmartPLS 2.0 structural equation modeling to validate the model. The results show that information sharing, information storage, enjoyment, self-presentation, get a feedback, economic reward, and keep up with trends had significant positive effects on self-disclosure. While extroversion and openness to use have significant positive effects on self-disclosure, conscientiousness and privacy concerns have significant negative effects on self-disclosure. The results of the study provide academic and practical implications for the future growth of location-based self-disclosure.

Keywords: check-in, extrinsic motivation, intrinsic motivation, personality trait, self-disclosure

Procedia PDF Downloads 145
86 Fabrication of High-Power AlGaN/GaN Schottky Barrier Diode with Field Plate Design

Authors: Chia-Jui Yu, Chien-Ju Chen, Jyun-Hao Liao, Chia-Ching Wu, Meng-Chyi Wu

Abstract:

In this letter, we demonstrate high-performance AlGaN/GaN planar Schottky barrier diodes (SBDs) on the silicon substrate with field plate structure for increasing breakdown voltage VB. A low turn-on resistance RON (3.55 mΩ-cm2), low reverse leakage current (< 0.1 µA) at -100 V, and high reverse breakdown voltage VB (> 1.1 kV) SBD has been fabricated. A virgin SBD exhibited a breakdown voltage (measured at 1 mA/mm) of 615 V, and with the field plate technology device exhibited a breakdown voltage (measured at 1 mA/mm) of 1525 V (the anode–cathode distance was LAC = 40 µm). Devices without the field plate design exhibit a Baliga’s figure of merit of VB2/ RON = 60.2 MW/cm2, whereas devices with the field plate design show a Baliga’s figure of merit of VB2/ RON = 340.9 MW/cm2 (the anode–cathode distance was LAC = 20 µm).

Keywords: AlGaN/GaN heterostructure, silicon substrate, Schottky barrier diode (SBD), high breakdown voltage, Baliga’s figure-of-merit, field plate

Procedia PDF Downloads 278
85 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 145
84 Breaking Barriers: Utilizing Innovation to Improve Educational Outcomes for Students with Disabilities

Authors: Emily Purdom, Rachel Robinson

Abstract:

As the number of students worldwide requiring speech-language therapy, occupational therapy and mental health services during their school day increases, innovation is becoming progressively more important to meet the demand. Telepractice can be used to reach a greater number of students requiring specialized therapy while maintaining the highest quality of care. It can be provided in a way that is not only effective but ultimately more convenient for student, teacher and therapist without the added burden of travel. Teletherapy eradicates many hurdles to traditional on-site service delivery and helps to solve the pervasive shortage of certified professionals. Because location is no longer a barrier to specialized education plans for students with disabilities when teletherapy is conducted, there are many advantages that can be deployed. Increased frequency of engagement is possible along with students receiving specialized care from a clinician that may not be in their direct area. Educational teams, including parents, can work together more easily and engage in face-to-face, student-centered collaboration through videoconference. Practical strategies will be provided for connecting students with qualified therapists without the typical in-person dynamic. In most cases, better therapy outcomes are going to be achieved when treatment is most convenient for the student and educator. This workshop will promote discussion in the field of education to increase advocacy for remote service delivery. It will serve as a resource for those wanting to expand their knowledge of options for students with special needs afforded through innovation.

Keywords: education technology, innovation, student support services, telepractice

Procedia PDF Downloads 214
83 Indigenous Women and Intimate Partner Homicide in Australia: Preventing Future Deaths through Law, Policy and Practice Change

Authors: Kyllie Cripps

Abstract:

In Australia, not dissimilar to other jurisdictions with indigenous populations, indigenous women are more likely to experience violence than any other section of society. In recent years in response to horrific examples of Indigenous women’s deaths, Australian Coronial courts have investigated, wanting to know more about the circumstances that led to the deaths. This paper critically examined 12 Coronial Court investigations from around Australia, analyzing them thematically. The analysis highlighted the differential vulnerability of indigenous women to intimate partner homicides. In all the cases reviewed, it was evident that the women’s deaths, in most instances were entirely preventable. Evidence was also presented demonstrating that services were aware of the women’s heightened risks but were unable to sufficiently coordinate themselves to provide wrap around support to minimise the risk of violence and to maximise the women’s safety. Consequently, putting the women in environments where their deaths were both predictable and inevitable. The profound system failings at the intersections of law, policy, and practice have ultimately cost indigenous women their lives. This paper firstly explores the nuances of the Coronial Court findings – demonstrating the similarities and differences present within the cases. Part two interrogates the reported system failings, and part three considers potential improvements in system integration to prevent future deaths. The paper concludes recognizing that Indigenous women play important valued roles in indigenous communities, their loss has profound costs and consequences, and to honor their memory, we must learn from their deaths and improve responses to intimate partner violence.

Keywords: homicide, intimate partner violence, indigenous women

Procedia PDF Downloads 156
82 High Density Polyethylene Biocomposites Reinforced with Hydroxyapatite Nanorods and Carbon Nanofibers for Joint Replacements

Authors: Chengzhu Liao, Jianbo Zhang, Haiou Wang, Jing Ming, Huili Li, Yanyan Li, Hua Cheng, Sie Chin Tjong

Abstract:

Since Bonfield’s group’s pioneer work, there has been growing interest amongst the materials scientists, biomedical engineers and surgeons in the use of novel biomaterials for the treatment of bone defects and injuries. This study focuses on the fabrication, mechanical characterization and biocompatibility evaluation of high density polyethylene (HDPE) reinforced with hydroxyapatite nanorods (HANR) and carbon nanofibers (CNF). HANRs of 20 wt% and CNFs of 0.5-2 wt% were incorporated into HDPE to form biocomposites using traditional melt-compounding and injection molding techniques. The mechanical measurements show that CNF additions greatly improve the tensile strength and Young’s modulus of HDPE and HDPE-20% nHA composites. Meanwhile, the nHA and CNF fillers were found to be effective to improve dimensional and thermal stability of HDPE. The results of osteoblast cell cultivation and dimethyl thiazolyl diphenyl thiazolyl tetrazolium (MTT) tests showed that the HDPE/ CNF-nHA nanocomposites are biocompatible. Such HDPE/ CNF-nHA hybrids are found to be potential biomaterials for making orthopedic joint/bone replacements.

Keywords: biocompatibility, biocomposite, carbon nanofiber, high density polyethylene, hydroxyapatite

Procedia PDF Downloads 269
81 Attachment and Decision-Making in Infertility

Authors: Anisa Luli, Alessandra Santona

Abstract:

Wanting a child and experiencing the impossibility to conceive is a painful condition that often is linked to infertility and often leads infertile individuals to experience psychological, relational and social problems. In this situation, infertile couples have to review their choices and take into consideration new ones. Few studies have focused on the decision-making style used by infertile individuals to solve their problem and on the factors that influences it. The aim of this paper is to define the style of decision-making used by infertile persons to give a solution to the “problem” and the predictive role of the attachment, of the representations of the relationship with parents in childhood and of the dyadic adjustment. The total sample is composed by 251 participants, divided in two groups: the experimental group composed by 114 participants, 62 males and 52 females, age between 25 and 59 years, and the control group composed by 137 participants, 65 males and 72 females, age between 22 and 49 years. The battery of instruments comprises: General Decision Making Style (GDMS), Experiences in Close Relationships Questionnaire Revised (ECR-R), Dyadic Adjustment Scale (DAS), Parental Bonding Instrument (PBI) and Symptom Checklist-90-R (SCL-90-R). The results from the analysis of the samples showed a prevalence of the rational decision-making style for both males and females, experimental and control group. There have been founded significant statistical relationships between the attachment scales, the representations of the parenting style, the dyadic adjustment and the decision-making styles. These results contribute to enrich the literature on the subject of decision-making in infertile people and show the relationship between the attachment and decision-making styles, confirming the few results in literature.

Keywords: attachment, decision-making style, infertility, dyadic adjustment

Procedia PDF Downloads 550
80 A Design of Elliptic Curve Cryptography Processor based on SM2 over GF(p)

Authors: Shiji Hu, Lei Li, Wanting Zhou, DaoHong Yang

Abstract:

The data encryption, is the foundation of today’s communication. On this basis, how to improve the speed of data encryption and decryption is always a problem that scholars work for. In this paper, we proposed an elliptic curve crypto processor architecture based on SM2 prime field. In terms of hardware implementation, we optimized the algorithms in different stages of the structure. In finite field modulo operation, we proposed an optimized improvement of Karatsuba-Ofman multiplication algorithm, and shorten the critical path through pipeline structure in the algorithm implementation. Based on SM2 recommended prime field, a fast modular reduction algorithm is used to reduce 512-bit wide data obtained from the multiplication unit. The radix-4 extended Euclidean algorithm was used to realize the conversion between affine coordinate system and Jacobi projective coordinate system. In the parallel scheduling of point operations on elliptic curves, we proposed a three-level parallel structure of point addition and point double based on the Jacobian projective coordinate system. Combined with the scalar multiplication algorithm, we added mutual pre-operation to the point addition and double point operation to improve the efficiency of the scalar point multiplication. The proposed ECC hardware architecture was verified and implemented on Xilinx Virtex-7 and ZYNQ-7 platforms, and each 256-bit scalar multiplication operation took 0.275ms. The performance for handling scalar multiplication is 32 times that of CPU(dual-core ARM Cortex-A9).

Keywords: Elliptic curve cryptosystems, SM2, modular multiplication, point multiplication.

Procedia PDF Downloads 61
79 Analytical Solution of Blassius Equation Using the Kourosh Method

Authors: Mohammad Reza Shahnazari, Reza Kazemi, Ali Saberi

Abstract:

Most of the engineering problems are in nonlinear forms. Nonlinear boundary layer problems defined in infinite intervals contain specific complexities, especially in boundary layer condition conformance. As an example of these nonlinear complex problems, the well-known Blasius equation can be mentioned, which itself is one of the classic boundary layer problems. No analytical solution has been proposed yet for the Blasius equation due to its complexity. In this paper, an analytical method, namely the Kourosh method, based on the singularity perturbation method and the Liao homotopy analysis is utilized to solve the Blasius problem. In this method, an inner solution is developed in the [0,1] interval to expedite the solution convergence. The magnitude of the f ˝(0), as an essential quantity for determining the physical parameters, is directly calculated from the solution of the boundary condition problem. The advantages of this solution are that it does not need any numerical solution, it has a closed form and that its validation is shown in the entire [0,∞] interval. Furthermore, all of the desirable parameters could be extracted through a series of simple analytical operations from the final solution. This solution also satisfies the continuity conditions, which is one of the main contributions of this paper in comparison with most of the other proposed analytical solutions available in the literature. Comparison with numerical solutions reveals that the proposed method is highly accurate and convenient for application.

Keywords: Blasius equation, boundary layer, Kourosh method, analytical solution

Procedia PDF Downloads 357
78 Numerical Study on the Performance of Upgraded Victorian Brown Coal in an Ironmaking Blast Furnace

Authors: Junhai Liao, Yansong Shen, Aibing Yu

Abstract:

A 3D numerical model is developed to simulate the complicated in-furnace combustion phenomena in the lower part of an ironmaking blast furnace (BF) while using pulverized coal injection (PCI) technology to reduce the consumption of relatively expensive coke. The computational domain covers blowpipe-tuyere-raceway-coke bed in the BF. The model is validated against experimental data in terms of gaseous compositions and coal burnout. Parameters, such as coal properties and some key operational variables, play an important role on the performance of coal combustion. Their diverse effects on different combustion characteristics are examined in the domain, in terms of gas compositions, temperature, and burnout. The heat generated by the combustion of upgraded Victorian brown coal is able to meet the heating requirement of a BF, hence making upgraded brown coal injected into BF possible. It is evidenced that the model is suitable to investigate the mechanism of the PCI operation in a BF. Prediction results provide scientific insights to optimize and control of the PCI operation. This model cuts the cost to investigate and understand the comprehensive combustion phenomena of upgraded Victorian brown coal in a full-scale BF.

Keywords: blast furnace, numerical study, pulverized coal injection, Victorian brown coal

Procedia PDF Downloads 210
77 The Effect of Media Effect, Conformity, and Personality on Customers’ Purchase Intention under the Influence of COVID-19 Pandemic

Authors: Tsai-Yun Liao, Fang-Yi Hsu

Abstract:

Consumer behavior and consumption patterns have changed in reacting to the threat of COVID-19 pandemic situations. In order to explore the factors affecting customers’ purchase intention under the influence of the COVID-19 pandemic, this research uses structural equation modeling to explore the effect of media effect, conformity, and personality on customers’ purchase intention. Four essential objectives are investigated: how does media affect the conformity and perceived value of customers; the effect of media effect, conformity, and personality on customers’ purchase intention; the moderating effect of personality; and the mediating effect of perceived value toward purchase intention. By convenience sampling method, 428 questionnaires were collected, and the total number of valid samples was 406. Data analysis and results indicate that: (1) The media effect positively affects conformity. (2) The media effect positively affects perceived value. (3) Both conformity and perceived value positively affect purchase intention. (4) Consumer’s personality of openness to experience moderates the relationship between conformity and purchase intention. (5) Media effect affects purchase intention through the mediating effect of perceived value. This study contributes to the research by providing the factors affecting customers’ purchase intention and to the enterprises by maintaining incumbent customers and attracting potential customers.

Keywords: COVID-19, media effect, conformity, personality, purchase intention

Procedia PDF Downloads 111
76 Application of a Generalized Additive Model to Reveal the Relations between the Density of Zooplankton with Other Variables in the West Daya Bay, China

Authors: Weiwen Li, Hao Huang, Chengmao You, Jianji Liao, Lei Wang, Lina An

Abstract:

Zooplankton are a central issue in the ecology which makes a great contribution to maintaining the balance of an ecosystem. It is critical in promoting the material cycle and energy flow within the ecosystems. A generalized additive model (GAM) was applied to analyze the relationships between the density (individuals per m³) of zooplankton and other variables in West Daya Bay. All data used in this analysis (the survey month, survey station (longitude and latitude), the depth of the water column, the superficial concentration of chlorophyll a, the benthonic concentration of chlorophyll a, the number of zooplankton species and the number of zooplankton species) were collected through monthly scientific surveys during January to December 2016. GLM model (generalized linear model) was used to choose the significant variables’ impact on the density of zooplankton, and the GAM was employed to analyze the relationship between the density of zooplankton and the significant variables. The results showed that the density of zooplankton increased with an increase of the benthonic concentration of chlorophyll a, but decreased with a decrease in the depth of the water column. Both high numbers of zooplankton species and the overall total number of zooplankton individuals led to a higher density of zooplankton.

Keywords: density, generalized linear model, generalized additive model, the West Daya Bay, zooplankton

Procedia PDF Downloads 117
75 International Tourists’ Travel Motivation by Push-Pull Factors and Decision Making for Selecting Thailand as Destination Choice

Authors: Siripen Yiamjanya, Kevin Wongleedee

Abstract:

This research paper aims to identify travel motivation by push and pull factors that affected decision making of international tourists in selecting Thailand as their destination choice. A total of 200 international tourists who traveled to Thailand during January and February, 2014 were used as the sample in this study. A questionnaire was employed as a tool in collecting the data, conducted in Bangkok. The list consisted of 30 attributes representing both psychological factors as “push- based factors” and destination factors as “pull-based factors”. Mean and standard deviation were used in order to find the top ten travel motives that were important determinants in the respondents’ decision making process to select Thailand as their destination choice. The finding revealed the top ten travel motivations influencing international tourists to select Thailand as their destination choice included [i] getting experience in foreign land; [ii] Thai food; [iii] learning new culture; [iv] relaxing in foreign land; [v] wanting to learn new things; [vi] being interested in Thai culture, and traditional markets; [vii] escaping from same daily life; [viii] enjoying activities; [ix] adventure; and [x] good weather. Classification of push- based and pull- based motives suggested that getting experience in foreign land was the most important push motive for international tourists to travel, while Thai food portrayed its highest significance as pull motive. Discussion and suggestions were also made for tourism industry of Thailand.

Keywords: decision making, destination choice, international tourist, pull factor, push factor, Thailand, travel motivation

Procedia PDF Downloads 364
74 Pragmatism in Adaptive Reuse of Obsolete Industrial Land in China

Authors: Yong Li

Abstract:

Major cities in China has experienced a shift from production based on manufacturing industry to tertiary industry. How to make a better use of existing obsolete industrial land within urban cores has become a difficult problem for many policymakers. City governments regard old manufacturing industrial land as an important source of land to facilitate the development of the cities. Despite the announcement of policies in promoting that, a large portion of industrial land is still not properly redeveloped and most of them became obsolete. The study uses the project of Xinyi International Club as a case to examine the process of adaptive reuse of obsolete industrial space in Guangzhou, China. It attempts to elucidate the underlying mechanisms by identifying the key forces from both the government and the private sectors in influencing the process. The study found that market forces in transforming industrial space are exerting a strong impact on the existing land use planning system in Chinese cities. Pragmatic relaxation of the formal land use the regulatory framework and government supportive land-use intervention have also been crucial towards achieving successful implementation of the restructuring project and making it a showcase. This study questions whether these extraordinary measures, in particular, the use of temporary land use permit, are sustainable in facilitating the transformation of derelict industrial land, and in informing future industrial land-use restructuring policies. It concludes that, while the land use regulatory system in China is becoming increasingly dynamic and flexible, it remains ill-equipped in responding positively to the market, which is characterized by an increasing bargaining power of the private sector. A comprehensive appraisal of the overall impacts of these adaptive re-uses on society is wanting.

Keywords: China, land alteration, obsolete industrial properties, urban planning

Procedia PDF Downloads 121
73 Acceleration-Based Motion Model for Visual Simultaneous Localization and Mapping

Authors: Daohong Yang, Xiang Zhang, Lei Li, Wanting Zhou

Abstract:

Visual Simultaneous Localization and Mapping (VSLAM) is a technology that obtains information in the environment for self-positioning and mapping. It is widely used in computer vision, robotics and other fields. Many visual SLAM systems, such as OBSLAM3, employ a constant-speed motion model that provides the initial pose of the current frame to improve the speed and accuracy of feature matching. However, in actual situations, the constant velocity motion model is often difficult to be satisfied, which may lead to a large deviation between the obtained initial pose and the real value, and may lead to errors in nonlinear optimization results. Therefore, this paper proposed a motion model based on acceleration, which can be applied on most SLAM systems. In order to better describe the acceleration of the camera pose, we decoupled the pose transformation matrix, and calculated the rotation matrix and the translation vector respectively, where the rotation matrix is represented by rotation vector. We assume that, in a short period of time, the changes of rotating angular velocity and translation vector remain the same. Based on this assumption, the initial pose of the current frame is estimated. In addition, the error of constant velocity model was analyzed theoretically. Finally, we applied our proposed approach to the ORBSLAM3 system and evaluated two sets of sequences on the TUM dataset. The results showed that our proposed method had a more accurate initial pose estimation and the accuracy of ORBSLAM3 system is improved by 6.61% and 6.46% respectively on the two test sequences.

Keywords: error estimation, constant acceleration motion model, pose estimation, visual SLAM

Procedia PDF Downloads 62
72 An Investigation of Passivation Technology in Stainless Steel Alloy

Authors: Feng-Tsai Weng, Rick Wang, Yan-Cong Liao

Abstract:

Passivation is a kind of surface treatment for material to reinforce the corrosion resistance specially the stainless alloy. Passive film, is to getting more potential compared to their status before passivation. An oxidation film can be formed on the surface of stainless steel, which has a strong corrosion resistance ability after passivation treatment. In this research, a new passivation technology is proposed for a special stainless alloy which contains a 12-14% Chromium. This method includes the A-A-A (alkaline-acid-alkaline) process basically, which was developed by Carpenter that can neutralize trapped acid. Besides, a corrosion resistant coating layer was obtained by immersing the parts in a water bath of mineral oil at high temperature. Salt spray test ASTM B368 was conducted to investigated performance of corrosion resistant of the passivated stainless steel alloy parts. Results show much better corrosion resistant that followed a coating process after A-A-A Passivation process, than only using A-A-A process. The passivation time is with more than 380 hours of salt spray test ASTM B368, which is equal to 3000 hours of Salt spray test ASTM B117. Proposed passivation method of stainless steel can be completed in about 3 hours.

Keywords: passivation, alkaline-acid-alkaline, stainless steel, salt spray test

Procedia PDF Downloads 335
71 The Spread of Drugs in Higher Education

Authors: Wantana Amatariyakul, Chumnong Amatariyakul

Abstract:

The research aims to examine the spread of drugs in higher education, especially amphetamine which is rapidly increasing in Thai society, its causes and effects, including the sociological perspective, in order to explain, prevent, control, and solve the problems. The students who participated in this research are regular students of Rajamangala University of Technology Isan, Khon Kaen Campus. The data were collected using questionnaires, group discussions, and in-depth interviews. The quantity data were analyzed using frequency, percentage, mean and standard deviation and using content analysis to analyzed quality data. The result of the study showed that the students had the results of examination on level of knowledge and understanding on drug abuse projected that the majority of sample group attained their knowledge on drug abuse respectively. Despite their uncertainty, the majority of samples presumed that amphetamine, marijuana and grathom (Mitragyna Speciosa Korth) would most likely be abused. The reason for first drug abuse is because they want to try and their friends convince them, as well as, they want to relax or solve the problems in life, respectively. The bad effects appearing to the drug addicts shows that their health deteriorates or worsens, as well as, they not only lose their money but also face with worse mental states. The reasons that respondents tried to avoid using drugs or refused drugs offered by friends were: not wanting to disappoint or upset their family members, fear of rejection by family members, afraid of being arrested by the police, afraid of losing their educational opportunity and ruining their future respectively. Students therefore defended themselves against drug addiction by refusing to try all drugs. Besides this, the knowledge about the danger and the harm of drugs persuaded them to stay away from drugs.

Keywords: drugs, higher education, drug addiction, spread of drugs

Procedia PDF Downloads 293
70 Heritage and Tourism in the Era of Big Data: Analysis of Chinese Cultural Tourism in Catalonia

Authors: Xinge Liao, Francesc Xavier Roige Ventura, Dolores Sanchez Aguilera

Abstract:

With the development of the Internet, the study of tourism behavior has rapidly expanded from the traditional physical market to the online market. Data on the Internet is characterized by dynamic changes, and new data appear all the time. In recent years the generation of a large volume of data was characterized, such as forums, blogs, and other sources, which have expanded over time and space, together they constitute large-scale Internet data, known as Big Data. This data of technological origin that derives from the use of devices and the activity of multiple users is becoming a source of great importance for the study of geography and the behavior of tourists. The study will focus on cultural heritage tourist practices in the context of Big Data. The research will focus on exploring the characteristics and behavior of Chinese tourists in relation to the cultural heritage of Catalonia. Geographical information, target image, perceptions in user-generated content will be studied through data analysis from Weibo -the largest social networks of blogs in China. Through the analysis of the behavior of heritage tourists in the Big Data environment, this study will understand the practices (activities, motivations, perceptions) of cultural tourists and then understand the needs and preferences of tourists in order to better guide the sustainable development of tourism in heritage sites.

Keywords: Barcelona, Big Data, Catalonia, cultural heritage, Chinese tourism market, tourists’ behavior

Procedia PDF Downloads 110
69 Homosexuality and Culture: A Case Study Depicting the Struggles of a Married Lady

Authors: Athulya Jayakumar, M. Manjula

Abstract:

Though there has been a shift in the understanding of homosexuality from being a sin, crime or pathology in the medical and legal perspectives, the acceptance of homosexuality still remains very scanty in the Indian subcontinent. The present case study is a 24-year-old female who has completed a diploma in polytechnic engineering and residing in the state of Kerala. She initially presented with her husband with complaints of lack of sexual desire and non-cooperation from the index client. After an initial few sessions, the client revealed, in an individual session, about her homosexual orientation which was unknown to her family. She has had multiple short-term relations with females and never had any heterosexual orientation/interest. During her adolescence, she was wondering if she could change herself into a male. However, currently, she accepts her gender. She never wanted a heterosexual marriage; but, had to succumb to the pressure of mother, as a result of a series of unexpected incidents at home and had to agree for the marriage, also with a hope that she may change herself into a bi-sexual. The client was able to bond with the husband emotionally but the multiple attempts at sexual intercourse, at the insistence of the husband, had always been non-pleasurable and induced a sense of disgust. Currently, for several months, there has not been any sexual activity. Also, she actively avoids any chance to have a warm communication with him so that she can avoid chances of him approaching her in a sexual manner. The case study is an attempt to highlight the culture and the struggles of a homosexual individual who comes to therapy for wanting to be a ‘normal wife’ despite having knowledge of legal rights and scenario. There is a scarcity of Indian literature that has systematically investigated issues related to homosexuality. Data on prevalence, emotional problems faced and clinical services available are sparse though it is crucial for increasing understanding of sexual behaviour, orientation and difficulties faced in India.

Keywords: case study, culture, cognitive behavior therapy, female homosexuality

Procedia PDF Downloads 323
68 A Collaborative Action Research on the Teaching of Music Learning Center in Taiwan's Preschool

Authors: Mei-Ying Liao, Lee-Ching Wei, Jung-Hsiang Tseng

Abstract:

The main purpose of this study was to explore the process of planning and execution of the music learning center in preschool. This study was conducted through a collaborative action research method. The research members included a university music professor, a teaching guide, a preschool director, and a preschool teacher, leading a class of 5-6-year-old children to participate in this study. Five teaching cycles were performed with a subject of bird. In the whole process that lasted three months, the research members would maintain the conversation, reflection, and revision repeatedly. A triangular validated method was used to collect data, including archives, interviews, seminars, observations, journals, and learning evaluations to improve research on the validity and reliability. It was found that a successful music learning center required comprehensive planning and execution. It is also important to develop good listening, singing, respect, and homing habits at the beginning of running the music learning center. By timely providing diverse musical instruments, learning materials, and activities according to the teaching goals, children’s desire to learning was highly stimulated. Besides, peer interactions improved their ensemble and problem-solving abilities. The collaborative action research enhanced the preschool teacher’s confidence and promoted professional growth of the research members.

Keywords: collaborative action research, case study, music learning center, music development

Procedia PDF Downloads 349
67 Circadian Rhythm of Blood-Sucking Behavior of Female Forcipomyia taiwana

Authors: Chang-Liang Shih, Kuei-Min Liao, Ya-Yuan Wang, Wu-Chun Tu

Abstract:

Forcipomyia taiwana, an important vexing pest, influences the development of the industry of Taiwan tourism and the quality of country life. Using human-attractant method to investigate the blood-sucking behavior of Forcipomyia taiwana in three districts in Taichung, it revealed that female F. taiwana only exhibits blood-sucking behavior in daytime, not in nighttime. The blooding-sucking behavior of female F. taiwana was affected by some factors, i.e., season and atmospheric factors. During 2008 to 2010, our study revealed that blood-sucking behavior commenced from 7:00 to 8:00 in the spring equinox, the summer solstice and the autumnal equinox, but from 8:00 to 9:00 in the winter solstice. However, regardless of any seasons, it revealed that blood-sucking behavior reached the acme between 13:00 and 15:00, and then descending. In those four seasons, the summer solstice had longer lighting and higher temperature, the average sucking activity was around 12 hours, on the contrary, the winter solstice had shorter lighting and lower temperature, the average sucking activity bridled to around 8 hours whilst it retrenched to 11 hours in the spring equinox and the autumnal equinox. To analyze the correlation between blood-sucking behavior and atmospheric factors, it revealed that female blood-sucking behavior was correlated positively to temperature and lighting but negatively to humidity. In addition, our study also showed that there is no blood-sucking behavior under 18ºC.

Keywords: Forcipomyia taiwana, circadian rhythm, blood-sucking behavior, season

Procedia PDF Downloads 401
66 Micro-Arc Oxidation Titanium and Post Treatment by Cold Plasma and Graft Polymerization of Acrylic Acid for Biomedical Application

Authors: Shu-Chuan Liao, Chia-Ti Chang, Ko-Shao Chen

Abstract:

Titanium and its alloy are widely used in many fields such as dentistry or orthopaedics. Due to their high strength low elastic modulus that chemical inertness and bio inert. The micro-arc oxidation used to formation a micro porous ceramic oxide layer film on Titanium surface and also to improve the resistance corrosion. For improving the biocompatibility, micro-arc oxidation surfaces bio-inert need to introduce reactive group. We introduced boundary layer by used plasma enhanced chemical vapor deposition of hexamethyldisilazane (HMDS) and organic active layer by UV light graft reactive monomer acrylic acid (AAc) therefore we can immobilize Chondroitin sulphate on surface easily by crosslinking EDC/NHS. The surface properties and composition of the modified layer were measured by scanning electron microscopy (SEM), X-ray photoelectron spectroscopy (XPS) and X-ray diffraction (XRD) and water contact angle. Water contact angle of the plasma-treated Ti surface decreases from 60° to 38°, which is an indication of hydrophilicity. The results of electrochemical polarization analysis showed that the sample plasma treated at micro-arc oxidation after plasma treatment has the best corrosion resistance. The result showed that we can immobilize chondroitin sulfate successful by a series of modification and MTT assay indicated the biocompatibility has been improved in this study.

Keywords: MAO, plasma, graft polymerization, biomedical application

Procedia PDF Downloads 227
65 An Improved Multiple Scattering Reflectance Model Based on Specular V-Cavity

Authors: Hongbin Yang, Mingxue Liao, Changwen Zheng, Mengyao Kong, Chaohui Liu

Abstract:

Microfacet-based reflection models are widely used to model light reflections for rough surfaces. Microfacet models have become the standard surface material building block for describing specular components with varying roughness; and yet, while they possess many desirable properties as well as produce convincing results, their design ignores important sources of scattering, which can cause a significant loss of energy. Specifically, they only simulate the single scattering on the microfacets and ignore the subsequent interactions. As the roughness increases, the interaction will become more and more important. So a multiple-scattering microfacet model based on specular V-cavity is presented for this important open problem. However, it spends much unnecessary rendering time because of setting the same number of scatterings for different roughness surfaces. In this paper, we design a geometric attenuation term G to compute the BRDF (Bidirectional reflection distribution function) of multiple scattering of rough surfaces. Moreover, we consider determining the number of scattering by deterministic heuristics for different roughness surfaces. As a result, our model produces a similar appearance of the objects with the state of the art model with significantly improved rendering efficiency. Finally, we derive a multiple scattering BRDF based on the original microfacet framework.

Keywords: bidirectional reflection distribution function, BRDF, geometric attenuation term, multiple scattering, V-cavity model

Procedia PDF Downloads 93
64 A Machine Learning Approach for Detecting and Locating Hardware Trojans

Authors: Kaiwen Zheng, Wanting Zhou, Nan Tang, Lei Li, Yuanhang He

Abstract:

The integrated circuit industry has become a cornerstone of the information society, finding widespread application in areas such as industry, communication, medicine, and aerospace. However, with the increasing complexity of integrated circuits, Hardware Trojans (HTs) implanted by attackers have become a significant threat to their security. In this paper, we proposed a hardware trojan detection method for large-scale circuits. As HTs introduce physical characteristic changes such as structure, area, and power consumption as additional redundant circuits, we proposed a machine-learning-based hardware trojan detection method based on the physical characteristics of gate-level netlists. This method transforms the hardware trojan detection problem into a machine-learning binary classification problem based on physical characteristics, greatly improving detection speed. To address the problem of imbalanced data, where the number of pure circuit samples is far less than that of HTs circuit samples, we used the SMOTETomek algorithm to expand the dataset and further improve the performance of the classifier. We used three machine learning algorithms, K-Nearest Neighbors, Random Forest, and Support Vector Machine, to train and validate benchmark circuits on Trust-Hub, and all achieved good results. In our case studies based on AES encryption circuits provided by trust-hub, the test results showed the effectiveness of the proposed method. To further validate the method’s effectiveness for detecting variant HTs, we designed variant HTs using open-source HTs. The proposed method can guarantee robust detection accuracy in the millisecond level detection time for IC, and FPGA design flows and has good detection performance for library variant HTs.

Keywords: hardware trojans, physical properties, machine learning, hardware security

Procedia PDF Downloads 106
63 TCTN2 Maintains the Transition Zone Stability and Controls the Entrance of the Ciliary Membrane Protein into Primary Cilia

Authors: Rueyhung Weng, Chia-En Huang, Jung-Chi-Liao

Abstract:

The transition zone (TZ) serves as a diffusion barrier to regulate the ins and outs of the proteins recruited to the primary cilia. TCTN2 is one of the TZ proteins and its mutation causes Joubert syndrome, a serious multi-organ disease. Despite its important medical relevance, the functions of TCTN2 remain elusive. Here we created a TCTN2 gene deleted retinal pigment epithelial cells (RPE1) using CRISPR/Cas9-based genome editing technique and used this knockout line to reveal roles of TCTN2. TCTN2 knockout RPE1 cells displayed a significantly reduced ciliogenesis or a shortened primary cilium length in the cilium-remaining population. Intraflagellar transport protein IFT88 aberrantly accumulated at the tip of TCTN2 deficient cells. Guanine nucleotide exchange factor Arl13B was mostly absent from the ciliary compartment, with a small population localizing at the ciliary tip. The deficient TZ was corroborated with the mislocalization of two other TZ proteins TMEM67 and MKS1. In addition, TCTN2 deficiency induced TZ impairment led to the suppression of Sonic hedgehog signaling in response to Smoothened (Smo) agonist. Together, depletion of TCTN2 destabilizes other TZ proteins and considerably alters the localization of key transport and signaling-associated proteins, including IFT88, Arl13B, and Smo.

Keywords: CRISPR/Cas9, primary cilia, Sonic hedgehog signaling, transition zone

Procedia PDF Downloads 313
62 Localization of Buried People Using Received Signal Strength Indication Measurement of Wireless Sensor

Authors: Feng Tao, Han Ye, Shaoyi Liao

Abstract:

City constructions collapse after earthquake and people will be buried under ruins. Search and rescue should be conducted as soon as possible to save them. Therefore, according to the complicated environment, irregular aftershocks and rescue allow of no delay, a kind of target localization method based on RSSI (Received Signal Strength Indication) is proposed in this article. The target localization technology based on RSSI with the features of low cost and low complexity has been widely applied to nodes localization in WSN (Wireless Sensor Networks). Based on the theory of RSSI transmission and the environment impact to RSSI, this article conducts the experiments in five scenes, and multiple filtering algorithms are applied to original RSSI value in order to establish the signal propagation model with minimum test error respectively. Target location can be calculated from the distance, which can be estimated from signal propagation model, through improved centroid algorithm. Result shows that the localization technology based on RSSI is suitable for large-scale nodes localization. Among filtering algorithms, mixed filtering algorithm (average of average, median and Gaussian filtering) performs better than any other single filtering algorithm, and by using the signal propagation model, the minimum error of distance between known nodes and target node in the five scene is about 3.06m.

Keywords: signal propagation model, centroid algorithm, localization, mixed filtering, RSSI

Procedia PDF Downloads 263
61 Applying Artificial Neural Networks to Predict Speed Skater Impact Concussion Risk

Authors: Yilin Liao, Hewen Li, Paula McConvey

Abstract:

Speed skaters often face a risk of concussion when they fall on the ice floor and impact crash mats during practices and competitive races. Several variables, including those related to the skater, the crash mat, and the impact position (body side/head/feet impact), are believed to influence the severity of the skater's concussion. While computer simulation modeling can be employed to analyze these accidents, the simulation process is time-consuming and does not provide rapid information for coaches and teams to assess the skater's injury risk in competitive events. This research paper promotes the exploration of the feasibility of using AI techniques for evaluating skater’s potential concussion severity, and to develop a fast concussion prediction tool using artificial neural networks to reduce the risk of treatment delays for injured skaters. The primary data is collected through virtual tests and physical experiments designed to simulate skater-mat impact. It is then analyzed to identify patterns and correlations; finally, it is used to train and fine-tune the artificial neural networks for accurate prediction. The development of the prediction tool by employing machine learning strategies contributes to the application of AI methods in sports science and has theoretical involvements for using AI techniques in predicting and preventing sports-related injuries.

Keywords: artificial neural networks, concussion, machine learning, impact, speed skater

Procedia PDF Downloads 67
60 Distinct Antiviral Pathway for ZFP36-Like Family Members Against Flavivirus Infection

Authors: Ren-Jye Lin, Li-Hsiung Lin, Bing-Cheng Liu, Ching-Len Liao

Abstract:

The human zinc finger protein 36-like protein family, containing zinc finger protein 36-like 1 (ZFP36L1) and zinc finger protein 36-like 2 (ZFP36L2), belongs to CCCH-type zinc-finger protein identified as an RNA-binding protein that participates in controlling posttranscriptional regulation via RNA decay pathways. Recently, we demonstrated that human ZFP36L1 showed potent antiviral activity against flavivirus Infection by both 5´-3´ XRN1 and 3´-5´RNA-exosome RNA decay pathways (Journal of Virology 2022 Jan 12;96(1): e0166521). However, another zinc finger protein 36-like protein member, ZFP36L2, in the host defense response against flaviviruses has yet to be addressed. Here, we also demonstrate that ZFP36L2 functions as a host innate defender against flaviviruses, including Japanese encephalitis virus (JEV) and dengue virus (DENV). Overexpression of ZFP36L2 reduced JEV and DENV infection, and ZFP36L2 knockdown significantly promoted viral replication. Distinct from the antiviral mechanism of ZFP36L1, ZFP36L2 inhibits flavivirus infection by only a 5´-3´ XRN1-mediated RNA decay pathway but not the 3´-5´RNA-exosome RNA decay pathway. Human ZFP36L1 and ZFP36L2 can restrict flavivirus replication by directly binding and destabilizing viral RNA. Thus, for the first time, human zinc finger protein 36-like family members, ZFP36L1 and ZFP36L2, are identified as host antiviral factors that can bind and degrade flavivirus viral RNA by diverse antiviral mechanisms.

Keywords: ZFP36L1, ZFP36L2, 5'-3' exonuclease XRN1, antiviral mechansim

Procedia PDF Downloads 44
59 Enhancing Experiential Education in Teacher Education Classes Through Simulated Person Methodology

Authors: Karen Armstrong

Abstract:

This study is a narrative inquiry into the use of simulated person methodology (SPM) in teacher education classes. This methodology -often used in medical schools- has tremendous benefits in terms of enhancing experiential education in teacher education classes. Literacy education is a major focus in elementary schools. New teachers must work with parents to ensure that children learn to read and expand their literacy horizons. The classes used in this narrative inquiry research consist of one graduate class on family literacy and two pre-service teacher education classes: literacy and culture and early and family literacy. Two scenarios were devised, both of which simulated a parent-teacher interview. In the first scenario, the parent is a reluctant father who is ashamed of his lack of reading ability and does not understand why literacy is important. His seven-year-old son, wanting to emulate his father, has suddenly transformed from an eager student to one who rejects the value of reading in loyalty to his father who cannot read. In the second scenario, a father is called in by the teacher because his son has started acting out in class. The mother in this scenario is temporarily absent from the home, and the father is now the sole caregiver. In each of the scenarios, students are the teachers who are problem-solving these dilemmas in a safe environment with the 'parent' who is a specially trained simulated person. Teacher candidates enact, with the trained simulated person, their strategies for encouraging parents to engage in the literacy development of their children. Teacher candidates attempt to offer support and encouragement to parents. This simulation strategy offers both beginning and more experienced teachers the opportunity to practice an interview with two distinct and contrasting family situations with regard to the literacy of young children. The paper discusses the details of the scenarios enacted in class and the reflective discussion through which students learn from the simulation.

Keywords: experiential education, literacy, simulated person methodology, teacher education

Procedia PDF Downloads 84
58 A Robust Visual Simultaneous Localization and Mapping for Indoor Dynamic Environment

Authors: Xiang Zhang, Daohong Yang, Ziyuan Wu, Lei Li, Wanting Zhou

Abstract:

Visual Simultaneous Localization and Mapping (VSLAM) uses cameras to collect information in unknown environments to realize simultaneous localization and environment map construction, which has a wide range of applications in autonomous driving, virtual reality and other related fields. At present, the related research achievements about VSLAM can maintain high accuracy in static environment. But in dynamic environment, due to the presence of moving objects in the scene, the movement of these objects will reduce the stability of VSLAM system, resulting in inaccurate localization and mapping, or even failure. In this paper, a robust VSLAM method was proposed to effectively deal with the problem in dynamic environment. We proposed a dynamic region removal scheme based on semantic segmentation neural networks and geometric constraints. Firstly, semantic extraction neural network is used to extract prior active motion region, prior static region and prior passive motion region in the environment. Then, the light weight frame tracking module initializes the transform pose between the previous frame and the current frame on the prior static region. A motion consistency detection module based on multi-view geometry and scene flow is used to divide the environment into static region and dynamic region. Thus, the dynamic object region was successfully eliminated. Finally, only the static region is used for tracking thread. Our research is based on the ORBSLAM3 system, which is one of the most effective VSLAM systems available. We evaluated our method on the TUM RGB-D benchmark and the results demonstrate that the proposed VSLAM method improves the accuracy of the original ORBSLAM3 by 70%˜98.5% under high dynamic environment.

Keywords: dynamic scene, dynamic visual SLAM, semantic segmentation, scene flow, VSLAM

Procedia PDF Downloads 74