CINXE.COM

Search results for: in-group identification

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: in-group identification</title> <meta name="description" content="Search results for: in-group identification"> <meta name="keywords" content="in-group identification"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="in-group identification" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="in-group identification"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2944</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: in-group identification</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2944</span> Morality in Actual Behavior: The Moderation Effect of Identification with the Ingroup and Religion on Norm Compliance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shauma%20L.%20Tamba">Shauma L. Tamba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study examined whether morality is the most important aspect in actual behavior. The prediction was that people tend to behave in line with moral (as compared to competence) norms, especially when such norms are presented by their ingroup. The actual behavior that was tested was support for a military intervention without a mandate from the UN. In addition, this study also examined whether identification with the ingroup and religion moderated the effect of group and norm on support for the norm that was prescribed by their ingroup. The prediction was that those who identified themselves higher with the ingroup moral would show a higher support for the norm. Furthermore, the prediction was also that those who have religion would show a higher support for the norm in the ingroup moral rather than competence. In an online survey, participants were asked to read a scenario in which a military intervention without a mandate was framed as either the moral (but stupid) or smart (but immoral) thing to do by members of their own (ingroup) or another (outgroup) society. This study found that when people identified themselves with the smart (but immoral) norm, they showed a higher support for the norm. However, when people identified themselves with the moral (but stupid) norm, they tend to show a lesser support towards the norm. Most of the results in the study did not support the predictions. Possible explanations and implications are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=morality" title="morality">morality</a>, <a href="https://publications.waset.org/abstracts/search?q=competence" title=" competence"> competence</a>, <a href="https://publications.waset.org/abstracts/search?q=ingroup%20identification" title=" ingroup identification"> ingroup identification</a>, <a href="https://publications.waset.org/abstracts/search?q=religion" title=" religion"> religion</a>, <a href="https://publications.waset.org/abstracts/search?q=group%20norm" title=" group norm"> group norm</a> </p> <a href="https://publications.waset.org/abstracts/34751/morality-in-actual-behavior-the-moderation-effect-of-identification-with-the-ingroup-and-religion-on-norm-compliance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34751.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">408</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2943</span> The Influence of Group Heuristics on Corporate Social Responsibility Messages Designed to Reduce Illegal Consumption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kate%20Whitman">Kate Whitman</a>, <a href="https://publications.waset.org/abstracts/search?q=Zahra%20Murad"> Zahra Murad</a>, <a href="https://publications.waset.org/abstracts/search?q=Joe%20Cox"> Joe Cox</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Corporate social responsibility projects are suggested to motivate consumers to reciprocate good corporate deeds with their custom. When the projects benefit the ingroup vs the outgroup, such as locals rather than foreigners, the effect on reciprocity is suggested to be more powerful. This may be explained by group heuristics, a theory which indicates that favours to the ingroup (but not outgroup) are expected to be reciprocated, resulting in ingroup favouritism. The heuristic is theorised to explain prosocial behaviours towards the ingroup. The aim of this study is to test whether group heuristics similarly explain a reduction in antisocial behaviours towards the ingroup, measured by illegal consumption which harms a group that consumers identify with. In order to test corporate social responsibility messages, a population of interested consumers is required, so sport fans are recruited. A pre-registered experiment (N = 600) tests the influence of a focused “team” benefiting message vs a broader “sport” benefiting message on change in illegal intentions. The influence of group (team) identity and trait reciprocity on message efficacy are tested as measures of group heuristics. Results suggest that the “team” treatment significantly reduces illegal consumption intentions. The “sport” treatment interacted with the team identification measure, increasing illegal consumption intentions for low team identification individuals. The results suggest that corporate social responsibility may be effective in reducing illegal consumption, if the messages are delivered directly from brands to consumers with brand identification. Messages delivered on the behalf of an industry may have an undesirable effect. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=live%20sports" title="live sports">live sports</a>, <a href="https://publications.waset.org/abstracts/search?q=piracy" title=" piracy"> piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=counterfeiting" title=" counterfeiting"> counterfeiting</a>, <a href="https://publications.waset.org/abstracts/search?q=corporate%20social%20responsibility" title=" corporate social responsibility"> corporate social responsibility</a>, <a href="https://publications.waset.org/abstracts/search?q=group%20heuristics" title=" group heuristics"> group heuristics</a>, <a href="https://publications.waset.org/abstracts/search?q=ingroup%20bias" title=" ingroup bias"> ingroup bias</a>, <a href="https://publications.waset.org/abstracts/search?q=team%20identification" title=" team identification"> team identification</a> </p> <a href="https://publications.waset.org/abstracts/176230/the-influence-of-group-heuristics-on-corporate-social-responsibility-messages-designed-to-reduce-illegal-consumption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176230.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">84</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2942</span> Religious Cognition and Intergroup Bias in the Trolley Dilemma: Experimental Fieldwork in Fiji</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Crystal%20Shackleford">Crystal Shackleford</a>, <a href="https://publications.waset.org/abstracts/search?q=Michael%20Pasek"> Michael Pasek</a>, <a href="https://publications.waset.org/abstracts/search?q=Julia%20%20Smith"> Julia Smith</a>, <a href="https://publications.waset.org/abstracts/search?q=Jeremy%20Ginges"> Jeremy Ginges</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There is extensive debate about the causal role of religion in intergroup conflict. It is commonly accepted that religious beliefs promote in-group cohesion, but religion is often believed to exacerbate inter-group conflict. Fiji is religiously diverse and has a lengthy history of ethno-religious conflict. In a preregistered field experiment using a modified version of the trolley problem dilemma, Christian and Muslim Fijians were asked, first from their own perspective, and then from their God’s perspective, whether a religious ingroup member should sacrifice their life to save five children who were ingroup or outgroup members. Almost all Muslim participants believed that the person should always sacrifice themselves to save the children. Amongst Christian participants, thinking from God’s perspective increased their likelihood of saying the children should be saved by 35% and removed a 27% gap between responses to saving ingroup versus outgroup children. These results replicate previous findings from a Palestinian sample and demonstrate, in another cross-cultural context with a history of violent conflict, that religious cognition can decrease bias and promote the application of universal moral principles. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conflict" title="conflict">conflict</a>, <a href="https://publications.waset.org/abstracts/search?q=moral%20dilemma" title=" moral dilemma"> moral dilemma</a>, <a href="https://publications.waset.org/abstracts/search?q=psychology" title=" psychology"> psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=religion" title=" religion"> religion</a>, <a href="https://publications.waset.org/abstracts/search?q=thought%20experiments" title=" thought experiments"> thought experiments</a> </p> <a href="https://publications.waset.org/abstracts/108774/religious-cognition-and-intergroup-bias-in-the-trolley-dilemma-experimental-fieldwork-in-fiji" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108774.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">154</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2941</span> Majority through the Eyes of Minority: The Role of Social Norms in the Link between Intergroup Contact and Attitudes of the Roma toward Majority Society</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Roman%20Koky">Roman Koky</a>, <a href="https://publications.waset.org/abstracts/search?q=Sylvie%20Graf"> Sylvie Graf</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The relationship between the Roma and members of the majority is tense across Europe due to the fact that the Roma people are the most stigmatized minorities. Studies show that Roma is discriminated against on all levels of society. Improving intergroup relations between the Roma and members of the majority (i.e., non-Roma) is thus one of the most pressing issues of social psychological research. Intergroup contact theory is one of the most effective strategies for improving intergroup relations. However, current research has some limitations, such as the fact that most researchers focus primarily on the perspective of the majority, while the perspective of minorities (e.g., the Roma) is largely missing. Due to the persisting segregation of Roma, and thus the lack of opportunities for direct intergroup contact between the Roma and the majority, using direct intergroup contact as an intervention to reduce prejudice is difficult. In this research, we, therefore, focused on the effect of indirect forms of intergroup contact, particularly extended contact (i.e., experiences with outgroup members shared by fellow ingroup members such as friends or family). Extended contact functions as a descriptive social norm that informs about the actual amount of contact in one’s environment. In a group of Czech Roma (N = 226), the descriptive social norm was associated with ingroup injunctive social norm (e.g., the perceived support of intergroup contact with non-Roma by fellow ingroup members) and lower amount of prejudice toward the non-Roma. We discuss the findings with respect to possibilities to improve the relations between Roma and members of the majority across Europe. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intergroup%20contact" title="intergroup contact">intergroup contact</a>, <a href="https://publications.waset.org/abstracts/search?q=prejudice" title=" prejudice"> prejudice</a>, <a href="https://publications.waset.org/abstracts/search?q=majority" title=" majority"> majority</a>, <a href="https://publications.waset.org/abstracts/search?q=minority" title=" minority"> minority</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20norms" title=" social norms"> social norms</a> </p> <a href="https://publications.waset.org/abstracts/163496/majority-through-the-eyes-of-minority-the-role-of-social-norms-in-the-link-between-intergroup-contact-and-attitudes-of-the-roma-toward-majority-society" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163496.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">114</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2940</span> A Mega-Analysis of the Predictive Power of Initial Contact within Minimal Social Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cathal%20Ffrench">Cathal Ffrench</a>, <a href="https://publications.waset.org/abstracts/search?q=Ryan%20Barrett"> Ryan Barrett</a>, <a href="https://publications.waset.org/abstracts/search?q=Mike%20Quayle"> Mike Quayle</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is accepted in social psychology that categorization leads to ingroup favoritism, without further thought given to the processes that may co-occur or even precede categorization. These categorizations move away from the conceptualization of the self as a unique social being toward an increasingly collective identity. Subsequently, many individuals derive much of their self-evaluations from these collective identities. The seminal literature on this topic argues that it is primarily categorization that evokes instances of ingroup favoritism. Apropos to these theories, we argue that categorization acts to enhance and further intergroup processes rather than defining them. More accurately, we propose categorization aids initial ingroup contact and this first contact is predictive of subsequent favoritism on individual and collective levels. This analysis focuses on Virtual Interaction APPLication (VIAPPL) based studies, a software interface that builds on the flaws of the original minimal group studies. The VIAPPL allows the exchange of tokens in an intra and inter-group manner. This token exchange is how we classified the first contact. The study involves binary longitudinal analysis to better understand the subsequent exchanges of individuals based on who they first interacted with. Studies were selected on the criteria of evidence of explicit first interactions and two-group designs. Our findings paint a compelling picture in support of a motivated contact hypothesis, which suggests that an individual’s first motivated contact toward another has strong predictive capabilities for future behavior. This contact can lead to habit formation and specific favoritism towards individuals where contact has been established. This has important implications for understanding how group conflict occurs, and how intra-group individual bias can develop. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=categorization" title="categorization">categorization</a>, <a href="https://publications.waset.org/abstracts/search?q=group%20dynamics" title=" group dynamics"> group dynamics</a>, <a href="https://publications.waset.org/abstracts/search?q=initial%20contact" title=" initial contact"> initial contact</a>, <a href="https://publications.waset.org/abstracts/search?q=minimal%20social%20networks" title=" minimal social networks"> minimal social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=momentary%20contact" title=" momentary contact"> momentary contact</a> </p> <a href="https://publications.waset.org/abstracts/98661/a-mega-analysis-of-the-predictive-power-of-initial-contact-within-minimal-social-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98661.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2939</span> Personal Identity and Group Identity under Threat following Exclusion: A Study in Singapore and in the Netherlands</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Z.%20N.%20Huwa%C3%AB">Z. N. Huwaë</a>, <a href="https://publications.waset.org/abstracts/search?q=E.M.%20W.%20Tong"> E.M. W. Tong</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20H.%20M.%20See"> Y. H. M. See</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the present study, the researchers examined whether people from collectivistic cultures perceive a more group identity threat following social exclusion, whereas a more personal identity threat would be the case for those from individualistic cultures. In doing so, they investigated whether threatened identities depend on whether people are excluded by ingroup members (same ethnic background) or outgroup members (another ethnic background), as exclusion studies have shown mixed results when it comes to being excluded by ingroup versus outgroup members. For this purpose, students in Singapore and in the Netherlands participated in an online ball-tossing game (Cyberball) where they were excluded or included by other players with either the same or other ethnicity. Tentative results showed that both Singaporean and Dutch participants reported a more threat to their group identity than to their personal identity following exclusion and this did not depend on who excluded them. These tentative findings suggest that threatened identities following exclusion may not depend on cultural factors or on the source of exclusion. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cultures" title="cultures">cultures</a>, <a href="https://publications.waset.org/abstracts/search?q=exclusion" title=" exclusion"> exclusion</a>, <a href="https://publications.waset.org/abstracts/search?q=experiment" title=" experiment"> experiment</a>, <a href="https://publications.waset.org/abstracts/search?q=group%20membership" title=" group membership"> group membership</a>, <a href="https://publications.waset.org/abstracts/search?q=identities" title=" identities"> identities</a> </p> <a href="https://publications.waset.org/abstracts/123621/personal-identity-and-group-identity-under-threat-following-exclusion-a-study-in-singapore-and-in-the-netherlands" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123621.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">117</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2938</span> Group Boundaries against and Due to Identity Threat </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anna%20Siegler">Anna Siegler</a>, <a href="https://publications.waset.org/abstracts/search?q=Sara%20Bigazzi"> Sara Bigazzi</a>, <a href="https://publications.waset.org/abstracts/search?q=Sara%20Serdult"> Sara Serdult</a>, <a href="https://publications.waset.org/abstracts/search?q=Ildiko%20Bokretas"> Ildiko Bokretas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=group%20boundaries" title="group boundaries">group boundaries</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20threat" title=" identity threat"> identity threat</a>, <a href="https://publications.waset.org/abstracts/search?q=prejudice" title=" prejudice"> prejudice</a>, <a href="https://publications.waset.org/abstracts/search?q=superordinate%20groups" title=" superordinate groups"> superordinate groups</a> </p> <a href="https://publications.waset.org/abstracts/93684/group-boundaries-against-and-due-to-identity-threat" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93684.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">410</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2937</span> Beliefs about the God of the Other in Intergroup Conflict: Experimental Results from Israel and Palestine</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Crystal%20Shackleford">Crystal Shackleford</a>, <a href="https://publications.waset.org/abstracts/search?q=Michael%20Pasek"> Michael Pasek</a>, <a href="https://publications.waset.org/abstracts/search?q=Allon%20Vishkin"> Allon Vishkin</a>, <a href="https://publications.waset.org/abstracts/search?q=Jeremy%20Ginges"> Jeremy Ginges</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the Middle East, conflict is often viewed as religiously motivated. In this context, an important question is how we think the religion of the other drives their behavior. If people see conflicts as religious, they may expect the belief of the other to motivate intergroup bias. Beliefs about the motivations of the other impact how we engage with them. Conflict may result if actors believe the other’s religion promotes parochialism. To examine how actors on the ground in Israel-Palestine think about the God of the other as it relates to the other’s behavior towards them, we ran two studies in winter 2019 with an online sample of Jewish Israelis and fieldwork with Palestinians in the West Bank. We asked participants to predict the behavior of an outgroup member participating in an economic game task, dividing the money between themselves and another person, who is either an ingroup or outgroup member. Our experimental manipulation asks participants to predict the behavior of the other when the other is thinking of their God. Both Israelis and Palestinians believed outgroup members would show in-group favoritism, and that group members would give more to their in-group when thinking of their God. We also found that participants thought outgroup members would give more to their own ingroup when thinking of God. In other words, Palestinians predicted that Israelis would give more to fellow Israelis when thinking of God, but also more to Palestinians. Our results suggest that religious belief is seen to promote universal moral reasoning, even in a context with over 70 years of intense conflict. More broadly, this challenges the narrative that religion necessarily motivates intractable conflict. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conflict" title="conflict">conflict</a>, <a href="https://publications.waset.org/abstracts/search?q=psychology" title=" psychology"> psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=religion" title=" religion"> religion</a>, <a href="https://publications.waset.org/abstracts/search?q=meta-cognition" title=" meta-cognition"> meta-cognition</a>, <a href="https://publications.waset.org/abstracts/search?q=morality" title=" morality"> morality</a> </p> <a href="https://publications.waset.org/abstracts/108806/beliefs-about-the-god-of-the-other-in-intergroup-conflict-experimental-results-from-israel-and-palestine" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108806.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2936</span> Disability, Stigma and In-Group Identification: An Exploration across Different Disability Subgroups</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sharmila%20Rathee">Sharmila Rathee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Individuals with disability/ies often face negative attitudes, discrimination, exclusion, and inequality of treatment due to stigmatization and stigmatized treatment. While a significant number of studies in field of stigma suggest that group-identification has positive consequences for stigmatized individuals, ironically very miniscule empirical work in sight has attempted to investigate in-group identification as a coping measure against stigma, humiliation and related experiences among disability group. In view of death of empirical research on in-group identification among disability group, through present work, an attempt has been made to examine the experiences of stigma, humiliation, and in-group identification among disability group. Results of the study suggest that use of in-group identification as a coping strategy is not uniform across members of disability group and degree of in-group identification differs across different sub-groups of disability groups. Further, in-group identification among members of disability group depends on variables like degree and impact of disability, factors like onset of disability, nature, and visibility of disability, educational experiences and resources available to deal with disabling conditions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=disability" title="disability">disability</a>, <a href="https://publications.waset.org/abstracts/search?q=stigma" title=" stigma"> stigma</a>, <a href="https://publications.waset.org/abstracts/search?q=in-group%20identification" title=" in-group identification"> in-group identification</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20identity" title=" social identity"> social identity</a> </p> <a href="https://publications.waset.org/abstracts/48888/disability-stigma-and-in-group-identification-an-exploration-across-different-disability-subgroups" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48888.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">324</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2935</span> Forensic Challenges in Source Device Identification for Digital Videos</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mustapha%20Aminu%20Bagiwa">Mustapha Aminu Bagiwa</a>, <a href="https://publications.waset.org/abstracts/search?q=Ainuddin%20Wahid%20Abdul%20Wahab"> Ainuddin Wahid Abdul Wahab</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Yamani%20Idna%20Idris"> Mohd Yamani Idna Idris</a>, <a href="https://publications.waset.org/abstracts/search?q=Suleman%20Khan"> Suleman Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Video source device identification has become a problem of concern in numerous domains especially in multimedia security and digital investigation. This is because videos are now used as evidence in legal proceedings. Source device identification aim at identifying the source of digital devices using the content they produced. However, due to affordable processing tools and the influx in digital content generating devices, source device identification is still a major problem within the digital forensic community. In this paper, we discuss source device identification for digital videos by identifying techniques that were proposed in the literature for model or specific device identification. This is aimed at identifying salient open challenges for future research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=video%20forgery" title="video forgery">video forgery</a>, <a href="https://publications.waset.org/abstracts/search?q=source%20camcorder" title=" source camcorder"> source camcorder</a>, <a href="https://publications.waset.org/abstracts/search?q=device%20identification" title=" device identification"> device identification</a>, <a href="https://publications.waset.org/abstracts/search?q=forgery%20detection" title=" forgery detection "> forgery detection </a> </p> <a href="https://publications.waset.org/abstracts/21641/forensic-challenges-in-source-device-identification-for-digital-videos" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21641.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">631</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2934</span> Identification of Dynamic Friction Model for High-Precision Motion Control</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Martin%20Goubej">Martin Goubej</a>, <a href="https://publications.waset.org/abstracts/search?q=Tomas%20Popule"> Tomas Popule</a>, <a href="https://publications.waset.org/abstracts/search?q=Alois%20Krejci"> Alois Krejci</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper deals with experimental identification of mechanical systems with nonlinear friction characteristics. Dynamic LuGre friction model is adopted and a systematic approach to parameter identification of both linear and nonlinear subsystems is given. The identification procedure consists of three subsequent experiments which deal with the individual parts of plant dynamics. The proposed method is experimentally verified on an industrial-grade robotic manipulator. Model fidelity is compared with the results achieved with a static friction model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mechanical%20friction" title="mechanical friction">mechanical friction</a>, <a href="https://publications.waset.org/abstracts/search?q=LuGre%20model" title=" LuGre model"> LuGre model</a>, <a href="https://publications.waset.org/abstracts/search?q=friction%20identification" title=" friction identification"> friction identification</a>, <a href="https://publications.waset.org/abstracts/search?q=motion%20control" title=" motion control"> motion control</a> </p> <a href="https://publications.waset.org/abstracts/51897/identification-of-dynamic-friction-model-for-high-precision-motion-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51897.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">413</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2933</span> Identification of Nonlinear Systems Structured by Hammerstein-Wiener Model </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Brouri">A. Brouri</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Giri"> F. Giri</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Mkhida"> A. Mkhida</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Elkarkri"> A. Elkarkri</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20L.%20Chhibat"> M. L. Chhibat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Standard Hammerstein-Wiener models consist of a linear subsystem sandwiched by two memoryless nonlinearities. Presently, the linear subsystem is allowed to be parametric or not, continuous- or discrete-time. The input and output nonlinearities are polynomial and may be noninvertible. A two-stage identification method is developed such the parameters of all nonlinear elements are estimated first using the Kozen-Landau polynomial decomposition algorithm. The obtained estimates are then based upon in the identification of the linear subsystem, making use of suitable pre-ad post-compensators. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nonlinear%20system%20identification" title="nonlinear system identification">nonlinear system identification</a>, <a href="https://publications.waset.org/abstracts/search?q=Hammerstein-Wiener%20systems" title=" Hammerstein-Wiener systems"> Hammerstein-Wiener systems</a>, <a href="https://publications.waset.org/abstracts/search?q=frequency%20identification" title=" frequency identification"> frequency identification</a>, <a href="https://publications.waset.org/abstracts/search?q=polynomial%20decomposition" title=" polynomial decomposition"> polynomial decomposition</a> </p> <a href="https://publications.waset.org/abstracts/7969/identification-of-nonlinear-systems-structured-by-hammerstein-wiener-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7969.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">511</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2932</span> Structural Damage Detection Using Sensors Optimally Located</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Alberto%20Riveros">Carlos Alberto Riveros</a>, <a href="https://publications.waset.org/abstracts/search?q=Edwin%20Fabi%C3%A1n%20Garc%C3%ADa"> Edwin Fabián García</a>, <a href="https://publications.waset.org/abstracts/search?q=Javier%20Enrique%20Rivero"> Javier Enrique Rivero</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The measured data obtained from sensors in continuous monitoring of civil structures are mainly used for modal identification and damage detection. Therefore when modal identification analysis is carried out the quality in the identification of the modes will highly influence the damage detection results. It is also widely recognized that the usefulness of the measured data used for modal identification and damage detection is significantly influenced by the number and locations of sensors. The objective of this study is the numerical implementation of two widely known optimum sensor placement methods in beam-like structures <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=optimum%20sensor%20placement" title="optimum sensor placement">optimum sensor placement</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20damage%20detection" title=" structural damage detection"> structural damage detection</a>, <a href="https://publications.waset.org/abstracts/search?q=modal%20identification" title=" modal identification"> modal identification</a>, <a href="https://publications.waset.org/abstracts/search?q=beam-like%20structures." title=" beam-like structures. "> beam-like structures. </a> </p> <a href="https://publications.waset.org/abstracts/15240/structural-damage-detection-using-sensors-optimally-located" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15240.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">431</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2931</span> Self-Tuning Robot Control Based on Subspace Identification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mathias%20Marquardt">Mathias Marquardt</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter%20D%C3%BCnow"> Peter Dünow</a>, <a href="https://publications.waset.org/abstracts/search?q=Sandra%20Ba%C3%9Fler"> Sandra Baßler</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper describes the use of subspace based identification methods for auto tuning of a state space control system. The plant is an unstable but self balancing transport robot. Because of the unstable character of the process it has to be identified from closed loop input-output data. Based on the identified model a state space controller combined with an observer is calculated. The subspace identification algorithm and the controller design procedure is combined to a auto tuning method. The capability of the approach was verified in a simulation experiments under different process conditions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=auto%20tuning" title="auto tuning">auto tuning</a>, <a href="https://publications.waset.org/abstracts/search?q=balanced%20robot" title=" balanced robot"> balanced robot</a>, <a href="https://publications.waset.org/abstracts/search?q=closed%20loop%20identification" title=" closed loop identification"> closed loop identification</a>, <a href="https://publications.waset.org/abstracts/search?q=subspace%20identification" title=" subspace identification"> subspace identification</a> </p> <a href="https://publications.waset.org/abstracts/49108/self-tuning-robot-control-based-on-subspace-identification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49108.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">380</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2930</span> Distributed Perceptually Important Point Identification for Time Series Data Mining</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tak-Chung%20Fu">Tak-Chung Fu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ying-Kit%20Hung"> Ying-Kit Hung</a>, <a href="https://publications.waset.org/abstracts/search?q=Fu-Lai%20Chung"> Fu-Lai Chung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the field of time series data mining, the concept of the Perceptually Important Point (PIP) identification process is first introduced in 2001. This process originally works for financial time series pattern matching and it is then found suitable for time series dimensionality reduction and representation. Its strength is on preserving the overall shape of the time series by identifying the salient points in it. With the rise of Big Data, time series data contributes a major proportion, especially on the data which generates by sensors in the Internet of Things (IoT) environment. According to the nature of PIP identification and the successful cases, it is worth to further explore the opportunity to apply PIP in time series ‘Big Data’. However, the performance of PIP identification is always considered as the limitation when dealing with ‘Big’ time series data. In this paper, two distributed versions of PIP identification based on the Specialized Binary (SB) Tree are proposed. The proposed approaches solve the bottleneck when running the PIP identification process in a standalone computer. Improvement in term of speed is obtained by the distributed versions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20computing" title="distributed computing">distributed computing</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20analysis" title=" performance analysis"> performance analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=Perceptually%20Important%20Point%20identification" title=" Perceptually Important Point identification"> Perceptually Important Point identification</a>, <a href="https://publications.waset.org/abstracts/search?q=time%20series%20data%20mining" title=" time series data mining"> time series data mining</a> </p> <a href="https://publications.waset.org/abstracts/84358/distributed-perceptually-important-point-identification-for-time-series-data-mining" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84358.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">435</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2929</span> Genetic Algorithms for Parameter Identification of DC Motor ARMAX Model and Optimal Control</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Mansouri">A. Mansouri</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Krim"> F. Krim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents two techniques for DC motor parameters identification. We propose a numerical method using the adaptive extensive recursive least squares (AERLS) algorithm for real time parameters estimation. This algorithm, based on minimization of quadratic criterion, is realized in simulation for parameters identification of DC motor autoregressive moving average with extra inputs (ARMAX). As advanced technique, we use genetic algorithms (GA) identification with biased estimation for high dynamic performance speed regulation. DC motors are extensively used in variable speed drives, for robot and solar panel trajectory control. GA effectiveness is derived through comparison of the two approaches. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ARMAX%20model" title="ARMAX model">ARMAX model</a>, <a href="https://publications.waset.org/abstracts/search?q=DC%20motor" title=" DC motor"> DC motor</a>, <a href="https://publications.waset.org/abstracts/search?q=AERLS" title=" AERLS"> AERLS</a>, <a href="https://publications.waset.org/abstracts/search?q=GA" title=" GA"> GA</a>, <a href="https://publications.waset.org/abstracts/search?q=optimization" title=" optimization"> optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=parameter%20identification" title=" parameter identification"> parameter identification</a>, <a href="https://publications.waset.org/abstracts/search?q=PID%20speed%20regulation" title=" PID speed regulation"> PID speed regulation</a> </p> <a href="https://publications.waset.org/abstracts/9107/genetic-algorithms-for-parameter-identification-of-dc-motor-armax-model-and-optimal-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9107.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">380</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2928</span> Machine Learning Based Gender Identification of Authors of Entry Programs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Go%20Woon%20Kwak">Go Woon Kwak</a>, <a href="https://publications.waset.org/abstracts/search?q=Siyoung%20Jun"> Siyoung Jun</a>, <a href="https://publications.waset.org/abstracts/search?q=Soyun%20Maeng"> Soyun Maeng</a>, <a href="https://publications.waset.org/abstracts/search?q=Haeyoung%20Lee"> Haeyoung Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Entry is an education platform used in South Korea, created to help students learn to program, in which they can learn to code while playing. Using the online version of the entry, teachers can easily assign programming homework to the student and the students can make programs simply by linking programming blocks. However, the programs may be made by others, so that the authors of the programs should be identified. In this paper, as the first step toward author identification of entry programs, we present an artificial neural network based classification approach to identify genders of authors of a program written in an entry. A neural network has been trained from labeled training data that we have collected. Our result in progress, although preliminary, shows that the proposed approach could be feasible to be applied to the online version of entry for gender identification of authors. As future work, we will first use a machine learning technique for age identification of entry programs, which would be the second step toward the author identification. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=author%20identification" title=" author identification"> author identification</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20neural%20network" title=" deep neural network"> deep neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20identification" title=" gender identification"> gender identification</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/66685/machine-learning-based-gender-identification-of-authors-of-entry-programs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66685.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">324</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2927</span> Methodology for the Integration of Object Identification Processes in Handling and Logistic Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=L.%20Kiefer">L. Kiefer</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Richter"> C. Richter</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20Reinhart"> G. Reinhart</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The uprising complexity in production systems due to an increasing amount of variants up to customer innovated products leads to requirements that hierarchical control systems are not able to fulfil. Therefore, factory planners can install autonomous manufacturing systems. The fundamental requirement for an autonomous control is the identification of objects within production systems. In this approach an attribute-based identification is focused for avoiding dose-dependent identification costs. Instead of using an identification mark (ID) like a radio frequency identification (RFID)-Tag, an object type is directly identified by its attributes. To facilitate that it’s recommended to include the identification and the corresponding sensors within handling processes, which connect all manufacturing processes and therefore ensure a high identification rate and reduce blind spots. The presented methodology reduces the individual effort to integrate identification processes in handling systems. First, suitable object attributes and sensor systems for object identification in a production environment are defined. By categorising these sensor systems as well as handling systems, it is possible to match them universal within a compatibility matrix. Based on that compatibility further requirements like identification time are analysed, which decide whether the combination of handling and sensor system is well suited for parallel handling and identification within an autonomous control. By analysing a list of more than thousand possible attributes, first investigations have shown, that five main characteristics (weight, form, colour, amount, and position of subattributes as drillings) are sufficient for an integrable identification. This knowledge limits the variety of identification systems and leads to a manageable complexity within the selection process. Besides the procedure, several tools, as an example a sensor pool are presented. These tools include the generated specific expert knowledge and simplify the selection. The primary tool is a pool of preconfigured identification processes depending on the chosen combination of sensor and handling device. By following the defined procedure and using the created tools, even laypeople out of other scientific fields can choose an appropriate combination of handling devices and sensors which enable parallel handling and identification. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=agent%20systems" title="agent systems">agent systems</a>, <a href="https://publications.waset.org/abstracts/search?q=autonomous%20control" title=" autonomous control"> autonomous control</a>, <a href="https://publications.waset.org/abstracts/search?q=handling%20systems" title=" handling systems"> handling systems</a>, <a href="https://publications.waset.org/abstracts/search?q=identification" title=" identification"> identification</a> </p> <a href="https://publications.waset.org/abstracts/91481/methodology-for-the-integration-of-object-identification-processes-in-handling-and-logistic-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91481.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">177</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2926</span> Frequency Identification of Wiener-Hammerstein Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Brouri%20Adil">Brouri Adil</a>, <a href="https://publications.waset.org/abstracts/search?q=Giri%20Fouad"> Giri Fouad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The problem of identifying Wiener-Hammerstein systems is addressed in the presence of two linear subsystems of structure totally unknown. Presently, the nonlinear element is allowed to be noninvertible. The system identification problem is dealt by developing a two-stage frequency identification method such a set of points of the nonlinearity are estimated first. Then, the frequency gains of the two linear subsystems are determined at a number of frequencies. The method involves Fourier series decomposition and only requires periodic excitation signals. All involved estimators are shown to be consistent. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wiener-Hammerstein%20systems" title="Wiener-Hammerstein systems">Wiener-Hammerstein systems</a>, <a href="https://publications.waset.org/abstracts/search?q=Fourier%20series%20expansions" title=" Fourier series expansions"> Fourier series expansions</a>, <a href="https://publications.waset.org/abstracts/search?q=frequency%20identification" title=" frequency identification"> frequency identification</a>, <a href="https://publications.waset.org/abstracts/search?q=automation%20science" title=" automation science"> automation science</a> </p> <a href="https://publications.waset.org/abstracts/7941/frequency-identification-of-wiener-hammerstein-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7941.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">536</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2925</span> The Effect of Measurement Distribution on System Identification and Detection of Behavior of Nonlinearities of Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Javad%20Mollakazemi">Mohammad Javad Mollakazemi</a>, <a href="https://publications.waset.org/abstracts/search?q=Farhad%20Asadi"> Farhad Asadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Aref%20Ghafouri"> Aref Ghafouri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we considered and applied parametric modeling for some experimental data of dynamical system. In this study, we investigated the different distribution of output measurement from some dynamical systems. Also, with variance processing in experimental data we obtained the region of nonlinearity in experimental data and then identification of output section is applied in different situation and data distribution. Finally, the effect of the spanning the measurement such as variance to identification and limitation of this approach is explained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gaussian%20process" title="Gaussian process">Gaussian process</a>, <a href="https://publications.waset.org/abstracts/search?q=nonlinearity%20distribution" title=" nonlinearity distribution"> nonlinearity distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=particle%20filter" title=" particle filter"> particle filter</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20identification" title=" system identification"> system identification</a> </p> <a href="https://publications.waset.org/abstracts/17632/the-effect-of-measurement-distribution-on-system-identification-and-detection-of-behavior-of-nonlinearities-of-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17632.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">516</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2924</span> Evaluation of the Patient Identification Process in Healthcare Facilities in a Brazilian City Area</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carmen%20Silvia%20Gabriel">Carmen Silvia Gabriel</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20de%20F%C3%A1tima%20Paiva%20Brito"> Maria de Fátima Paiva Brito</a>, <a href="https://publications.waset.org/abstracts/search?q=Mariane%20de%20Paula%20Candido"> Mariane de Paula Candido</a>, <a href="https://publications.waset.org/abstracts/search?q=Vanessa%20Barato%20Oliveira"> Vanessa Barato Oliveira</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Patient identification is a necessary practice to ensure patient safety in any healthcare environment, including emergency care units, test laboratories, home care and clinics. The present study aimed to provide evidence that can effectively contribute to practices concerning patient identification. Its objective was to investigate patient identification in basic healthcare units through patient safety standards. To do so, a descriptive and non-experimental research outline study was carried out to inquire how patient identification takes place in a particular situation. All technical manager nurses from the chosen healthcare facilities were included in the sample for the study. Data was collected in September of 2014 after approval from the Committee of Ethics. All researched institutions fit the same profile: they’re public facilities for general care with observation beds. None of them has a wristband identification protocol or policy. Only one institution mentioned using some kind of visual identification; namely, body tags separated by colors according to the type of care, but it still does not apply the recommended tags by the Brazilian Ministry of Health. This study allowed the authors to acknowledge how important the commitment from the whole healthcare team in the patient identification process is and also acknowledge how necessary it is to implement institutional policies that may aid the healthcare units in this area to promote a quality and safe patient care. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=patient%20safety" title="patient safety">patient safety</a>, <a href="https://publications.waset.org/abstracts/search?q=identification" title=" identification"> identification</a>, <a href="https://publications.waset.org/abstracts/search?q=nursing" title=" nursing"> nursing</a>, <a href="https://publications.waset.org/abstracts/search?q=emergency%20care%20units" title=" emergency care units"> emergency care units</a> </p> <a href="https://publications.waset.org/abstracts/21279/evaluation-of-the-patient-identification-process-in-healthcare-facilities-in-a-brazilian-city-area" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21279.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">406</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2923</span> Use of Digital Forensics for Sex Determination by Nasal Index</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ashwini%20Kumar">Ashwini Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Vinod%20Nayak"> Vinod Nayak</a>, <a href="https://publications.waset.org/abstracts/search?q=Shankar%20M.%20Bakkannavar"> Shankar M. Bakkannavar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The identification of humans is important in forensic investigations not only in living but also in dead, especially in cases of mass disorders. The procedure followed in dead known as post-mortem identification is a challenging task for the forensic pathologist. However, it is mandatory in terms of the law to fulfill the social norms. Many times, due to mutilation of body parts, the normal methods of identification using skeletal remains cannot be used in the process of identification. In such cases, the intact components of the skeletal remains or bony parts play an important role in identification. In these situations, digital forensics can come to our rescue. The authors hereby made a study for determination of sex based on nasal index by using (Big Bore 16 Slice) Multidetector Computed Tomography 2D Scans. The results are represented as a poster. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sex%20determination" title="sex determination">sex determination</a>, <a href="https://publications.waset.org/abstracts/search?q=multidetector%20computed%20tomography" title=" multidetector computed tomography"> multidetector computed tomography</a>, <a href="https://publications.waset.org/abstracts/search?q=nasal%20index" title=" nasal index"> nasal index</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensic" title=" digital forensic"> digital forensic</a> </p> <a href="https://publications.waset.org/abstracts/41862/use-of-digital-forensics-for-sex-determination-by-nasal-index" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41862.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">398</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2922</span> System Identification and Quantitative Feedback Theory Design of a Lathe Spindle</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Khairudin">M. Khairudin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper investigates the system identification and design quantitative feedback theory (QFT) for the robust control of a lathe spindle. The dynamic of the lathe spindle is uncertain and time variation due to the deepness variation on cutting process. System identification was used to obtain the dynamics model of the lathe spindle. In this work, real time system identification is used to construct a linear model of the system from the nonlinear system. These linear models and its uncertainty bound can then be used for controller synthesis. The real time nonlinear system identification process to obtain a set of linear models of the lathe spindle that represents the operating ranges of the dynamic system. With a selected input signal, the data of output and response is acquired and nonlinear system identification is performed using Matlab to obtain a linear model of the system. Practical design steps are presented in which the QFT-based conditions are formulated to obtain a compensator and pre-filter to control the lathe spindle. The performances of the proposed controller are evaluated in terms of velocity responses of the the lathe machine spindle in corporating deepness on cutting process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=lathe%20spindle" title="lathe spindle">lathe spindle</a>, <a href="https://publications.waset.org/abstracts/search?q=QFT" title=" QFT"> QFT</a>, <a href="https://publications.waset.org/abstracts/search?q=robust%20control" title=" robust control"> robust control</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20identification" title=" system identification"> system identification</a> </p> <a href="https://publications.waset.org/abstracts/20793/system-identification-and-quantitative-feedback-theory-design-of-a-lathe-spindle" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20793.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">543</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2921</span> Identification of Shocks from Unconventional Monetary Policy Measures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Margarita%20Grushanina">Margarita Grushanina</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After several prominent central banks including European Central Bank (ECB), Federal Reserve System (Fed), Bank of Japan and Bank of England employed unconventional monetary policies in the aftermath of the financial crisis of 2008-2009 the problem of identification of the effects from such policies became of great interest. One of the main difficulties in identification of shocks from unconventional monetary policy measures in structural VAR analysis is that they often are anticipated, which leads to a non-fundamental MA representation of the VAR model. Moreover, the unconventional monetary policy actions may indirectly transmit to markets information about the future stance of the interest rate, which raises a question of the plausibility of the assumption of orthogonality between shocks from unconventional and conventional policy measures. This paper offers a method of identification that takes into account the abovementioned issues. The author uses factor-augmented VARs to increase the information set and identification through heteroskedasticity of error terms and rank restrictions on the errors’ second moments’ matrix to deal with the cross-correlation of the structural shocks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=factor-augmented%20VARs" title="factor-augmented VARs">factor-augmented VARs</a>, <a href="https://publications.waset.org/abstracts/search?q=identification%20through%20heteroskedasticity" title=" identification through heteroskedasticity"> identification through heteroskedasticity</a>, <a href="https://publications.waset.org/abstracts/search?q=monetary%20policy" title=" monetary policy"> monetary policy</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20VARs" title=" structural VARs"> structural VARs</a> </p> <a href="https://publications.waset.org/abstracts/81250/identification-of-shocks-from-unconventional-monetary-policy-measures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81250.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">348</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2920</span> UEMSD Risk Identification: Case Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20Sekulov%C3%A1">K. Sekulová</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20%C5%A0imon"> M. Šimon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The article demonstrates on a case study how it is possible to identify MSD risk. It is based on a dissertation risk identification model of occupational diseases formation in relation to the work activity that determines what risk can endanger workers who are exposed to the specific risk factors. It is evaluated based on statistical calculations. These risk factors are main cause of upper-extremities musculoskeletal disorders. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=case%20study" title="case study">case study</a>, <a href="https://publications.waset.org/abstracts/search?q=upper-extremity%20musculoskeletal%20disorders" title=" upper-extremity musculoskeletal disorders"> upper-extremity musculoskeletal disorders</a>, <a href="https://publications.waset.org/abstracts/search?q=ergonomics" title=" ergonomics"> ergonomics</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20identification" title=" risk identification"> risk identification</a> </p> <a href="https://publications.waset.org/abstracts/14518/uemsd-risk-identification-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14518.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">500</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2919</span> An Improved Parameter Identification Method for Three Phase Induction Motor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Liang%20Zhao">Liang Zhao</a>, <a href="https://publications.waset.org/abstracts/search?q=Chong-quan%20Zhong"> Chong-quan Zhong </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to improve the control performance of vector inverter, an improved parameter identification solution for induction motor is proposed in this paper. Dc or AC voltage is applied to the induction motor using the SVPWM through the inverter. Then stator resistance, stator leakage inductance, rotor resistance, rotor leakage inductance and mutual inductance are obtained according to the signal response. The discrete Fourier transform (DFT) is used to deal with the noise and harmonic. The impact on parameter identification caused by delays in the inverter switch tube, tube voltage drop and dead-time is avoided by effective compensation measures. Finally, the parameter identification experiment is conducted based on the vector inverter which using TMS320F2808 DSP as the core processor and results show that the strategy is verified. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=vector%20inverter" title="vector inverter">vector inverter</a>, <a href="https://publications.waset.org/abstracts/search?q=parameter%20identification" title=" parameter identification"> parameter identification</a>, <a href="https://publications.waset.org/abstracts/search?q=SVPWM%3B%20DFT" title=" SVPWM; DFT"> SVPWM; DFT</a>, <a href="https://publications.waset.org/abstracts/search?q=dead-time%20compensation" title=" dead-time compensation"> dead-time compensation</a> </p> <a href="https://publications.waset.org/abstracts/58286/an-improved-parameter-identification-method-for-three-phase-induction-motor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58286.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">463</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2918</span> Modeling of a UAV Longitudinal Dynamics through System Identification Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asadullah%20I.%20Qazi">Asadullah I. Qazi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mansoor%20Ahsan"> Mansoor Ahsan</a>, <a href="https://publications.waset.org/abstracts/search?q=Zahir%20Ashraf"> Zahir Ashraf</a>, <a href="https://publications.waset.org/abstracts/search?q=Uzair%20Ahmad"> Uzair Ahmad </a> </p> <p class="card-text"><strong>Abstract:</strong></p> System identification of an Unmanned Aerial Vehicle (UAV), to acquire its mathematical model, is a significant step in the process of aircraft flight automation. The need for reliable mathematical model is an established requirement for autopilot design, flight simulator development, aircraft performance appraisal, analysis of aircraft modifications, preflight testing of prototype aircraft and investigation of fatigue life and stress distribution etc.&nbsp; This research is aimed at system identification of a fixed wing UAV by means of specifically designed flight experiment. The purposely designed flight maneuvers were performed on the UAV and aircraft states were recorded during these flights. Acquired data were preprocessed for noise filtering and bias removal followed by parameter estimation of longitudinal dynamics transfer functions using MATLAB system identification toolbox. Black box identification based transfer function models, in response to elevator and throttle inputs, were estimated using least square error&nbsp;&nbsp; technique. The identification results show a high confidence level and goodness of fit between the estimated model and actual aircraft response. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fixed%20wing%20UAV" title="fixed wing UAV">fixed wing UAV</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20identification" title=" system identification"> system identification</a>, <a href="https://publications.waset.org/abstracts/search?q=black%20box%20modeling" title=" black box modeling"> black box modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=longitudinal%20dynamics" title=" longitudinal dynamics"> longitudinal dynamics</a>, <a href="https://publications.waset.org/abstracts/search?q=least%20square%20error" title=" least square error"> least square error</a> </p> <a href="https://publications.waset.org/abstracts/70091/modeling-of-a-uav-longitudinal-dynamics-through-system-identification-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70091.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">325</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2917</span> Morphological and Biological Identification of Fusarium Species Associated with Ear Rot Disease of Maize in Indonesia and Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Darnetty%20Baharuddin%20Salleh">Darnetty Baharuddin Salleh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fusarium ear rot disease is one of the most important diseases of maize and not only causes significant losses but also produced harmful mycotoxins to animals and humans. A total of 141 strains of Fusarium species were isolated from maize plants showing typical ear rot symptoms in Indonesia, and Malaysia by using the semi-selective medium (peptone pentachloronitrobenzene agar, PPA). These strains were identified morphologically. For strains in Gibberella fujikuroi species complex (Gfsc), the identification was continued by using biological identification. Three species of Fusarium were morphologically identified as Fusarium in Gibberella species complex (105 strains, 74.5%), F. verticillioides (78 strains), F. proliferatum (24 strains) and F. subglutinans (3 strains) and five species from other section (36 strains, 25.5%), F. graminearum (14 strains), F. oxysporum (8 strains), F. solani ( 1 strain), and F. semitectum (13 strains). Out of 105 Fusarium species in Gfsc, 63 strains were identified as MAT-1, 25 strains as MAT-2 and 17 strains could not be identified and in crosses with nine standard testers, three mating populations of Fusarium were identified as MP-A, G. moniliformis (68 strains, 64.76%), MP-D, G. intermedia (21 strains, 20%) and MP-E, G. subglutinans (3 strains, 2.9%), and 13 strains (12.38%) could not be identified. All trains biologically identified as MP-A, MP-D, and MP-E, were identified morphologically as F. verticillioides, F. proliferatum, and F. subglutinans, respectively. Thus, the results of this study indicated that identification based on biological identification were consistent with those of morphological identification. This is the first report on the presence of MP-A, MP-D, and MP-E on ear rot-infected maize in Indonesia; MP-A and MP-E in Malaysia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fusarium" title="Fusarium">Fusarium</a>, <a href="https://publications.waset.org/abstracts/search?q=MAT-1" title=" MAT-1"> MAT-1</a>, <a href="https://publications.waset.org/abstracts/search?q=MAT-2" title=" MAT-2"> MAT-2</a>, <a href="https://publications.waset.org/abstracts/search?q=MP-A" title=" MP-A"> MP-A</a>, <a href="https://publications.waset.org/abstracts/search?q=MP-D" title=" MP-D"> MP-D</a>, <a href="https://publications.waset.org/abstracts/search?q=MP-E" title=" MP-E"> MP-E</a> </p> <a href="https://publications.waset.org/abstracts/37088/morphological-and-biological-identification-of-fusarium-species-associated-with-ear-rot-disease-of-maize-in-indonesia-and-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37088.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">310</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2916</span> The Impact of the Cross Race Effect on Eyewitness Identification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Leah%20Wilck">Leah Wilck</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Eyewitness identification is arguably one of the most utilized practices within our legal system; however, exoneration cases indicate that this practice may lead to accuracy and conviction errors. The purpose of this study was to examine the effects of the cross-race effect, the phenomena in which people are able to more easily and accurately identify faces from within their racial category, on the accuracy of eyewitness identification. Participants watched three separate videos of a perpetrator trying to steal a bicycle. In each video, the perpetrator was of a different race and gender. Participants watched a video where the perpetrator was a Black male, a White male, and a White female. Following the completion of watching each video, participants were asked to recall everything they could about the perpetrator they witnessed. The initial results of the study did not find the expected cross-race effect impacted the eyewitness identification accuracy. These surprising results are discussed in terms of cross-race bias and recognition theory as well as applied implications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cross%20race%20effect" title="cross race effect">cross race effect</a>, <a href="https://publications.waset.org/abstracts/search?q=eyewitness%20identification" title=" eyewitness identification"> eyewitness identification</a>, <a href="https://publications.waset.org/abstracts/search?q=own-race%20bias" title=" own-race bias"> own-race bias</a>, <a href="https://publications.waset.org/abstracts/search?q=racial%20profiling" title=" racial profiling"> racial profiling</a> </p> <a href="https://publications.waset.org/abstracts/135539/the-impact-of-the-cross-race-effect-on-eyewitness-identification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135539.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">164</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2915</span> New Approach for Constructing a Secure Biometric Database</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Kebbeb">A. Kebbeb</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Mostefai"> M. Mostefai</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Benmerzoug"> F. Benmerzoug</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20Chahir"> Y. Chahir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The multimodal biometric identification is the combination of several biometric systems. The challenge of this combination is to reduce some limitations of systems based on a single modality while significantly improving performance. In this paper, we propose a new approach to the construction and the protection of a multimodal biometric database dedicated to an identification system. We use a topological watermarking to hide the relation between face image and the registered descriptors extracted from other modalities of the same person for more secure user identification. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biometric%20databases" title="biometric databases">biometric databases</a>, <a href="https://publications.waset.org/abstracts/search?q=multimodal%20biometrics" title=" multimodal biometrics"> multimodal biometrics</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20authentication" title=" security authentication"> security authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20watermarking" title=" digital watermarking"> digital watermarking</a> </p> <a href="https://publications.waset.org/abstracts/3126/new-approach-for-constructing-a-secure-biometric-database" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3126.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">391</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=in-group%20identification&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=in-group%20identification&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=in-group%20identification&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=in-group%20identification&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=in-group%20identification&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=in-group%20identification&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=in-group%20identification&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=in-group%20identification&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=in-group%20identification&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=in-group%20identification&amp;page=98">98</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=in-group%20identification&amp;page=99">99</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=in-group%20identification&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10