CINXE.COM
Search results for: Arnold I. Malag
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: Arnold I. Malag</title> <meta name="description" content="Search results for: Arnold I. Malag"> <meta name="keywords" content="Arnold I. Malag"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="Arnold I. Malag" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="Arnold I. Malag"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 44</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: Arnold I. Malag</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">44</span> Characterization of Coastal Solid Waste: Basis for the Development of Waste Collector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arnold%20I.%20Malag">Arnold I. Malag</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study wants to establish the data on the characteristics of coastal solid waste in main Island of Masbate as a model for technology interventions. The research utilized the Google Maps to measure the coastal length and Fishbowl Method for area identification. The solid wastes gathered were classified as residual, non-biodegradable, recyclable wastes, and special wastes, based on the waste analysis and characterization manual of Philippine Environmental Governance Project. The wastes were evaluated by weight in kg., dimension in cm., and characteristics as floating or non-floating. Based on the dimension of coastal solid waste, the biodegradable, recyclable, residual and special waste have the average of 40.95 cm., 16.25 cm., 31.37 cm., and 0.725cm. respectively. The waste in the coastal areas is dominated by biodegradable, followed by residual, then recyclable and special wastes with the data of 0.566 kg/m, 0.533 kg/m, 0.114 kg/m and .0007 kg/m respectively. The 97.15% of solid wastes collected is characterized as “floating”, where in the sources are the nearest rivers and waterways and/or the nearest populated areas adjacent to the island. This accumulation of solid wastes can be minimized and controlled by utilizing a floating equipment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=solid%20waste" title="solid waste">solid waste</a>, <a href="https://publications.waset.org/abstracts/search?q=coastal%20waste" title=" coastal waste"> coastal waste</a>, <a href="https://publications.waset.org/abstracts/search?q=waste%20characterization" title=" waste characterization"> waste characterization</a>, <a href="https://publications.waset.org/abstracts/search?q=waste%20collector" title=" waste collector"> waste collector</a> </p> <a href="https://publications.waset.org/abstracts/161892/characterization-of-coastal-solid-waste-basis-for-the-development-of-waste-collector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161892.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">83</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">43</span> The Desire to Know: Arnold’s Contribution to a Psychological Conceptualization of Academic Motivation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=F.%20Ruiz-Fuster">F. Ruiz-Fuster</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Arnold’s redefinition of human motives can sustain a psychology of education which emphasizes the beauty of knowledge and the exercise of intellectual functions. Thus, education instead of focusing on skills and learning by doing would be centered on ‘the widest reaches of the human spirit’. One way to attain it is by developing children’s inherent interest. Arnold takes into account the fact that the desire to know is the inherent interest which leads students to explore and learn. She also emphasizes the need of exercising human functions as thinking, judging and reasoning. According to Arnold, the influence of psychological theories of motivation in education has derived in considering that all learning and school tasks should derive from children’s needs and impulses. The desire to know and the curiosity have not been considered as basic and active as any instinctive drive or basic need, so there has been an attempt to justify and understand how biological drives guide student’s learning. However, understanding motives and motivation not as a drive, an instinct or an impulse guided by our basic needs, but as a want that leads to action can help to understand, from a psychological perspective, how teachers can motivate students to learn, strengthening their desire and interest to reason and discover the whole new world of knowledge. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20motivation" title="academic motivation">academic motivation</a>, <a href="https://publications.waset.org/abstracts/search?q=interests" title=" interests"> interests</a>, <a href="https://publications.waset.org/abstracts/search?q=desire%20to%20know" title=" desire to know"> desire to know</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20psychology" title=" educational psychology"> educational psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20functions" title=" intellectual functions"> intellectual functions</a> </p> <a href="https://publications.waset.org/abstracts/102345/the-desire-to-know-arnolds-contribution-to-a-psychological-conceptualization-of-academic-motivation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102345.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">42</span> Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Abdrhman%20M.%20Ukasha">Ali Abdrhman M. Ukasha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SSPCE%20method" title="SSPCE method">SSPCE method</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20compression-salt-%20peppers%20attacks" title=" image compression-salt- peppers attacks"> image compression-salt- peppers attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=bitplanes%20decomposition" title=" bitplanes decomposition"> bitplanes decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=Arnold%20transform" title=" Arnold transform"> Arnold transform</a>, <a href="https://publications.waset.org/abstracts/search?q=lossless%20image%20encryption" title=" lossless image encryption"> lossless image encryption</a> </p> <a href="https://publications.waset.org/abstracts/14573/bitplanes-gray-level-image-encryption-approach-using-arnold-transform" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14573.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">436</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">41</span> Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20A.%20Ukasha">Ali A. Ukasha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SSPCE%20method" title="SSPCE method">SSPCE method</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20compression" title=" image compression"> image compression</a>, <a href="https://publications.waset.org/abstracts/search?q=salt%20and%0D%0Apeppers%20attacks" title=" salt and peppers attacks"> salt and peppers attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=bitplanes%20decomposition" title=" bitplanes decomposition"> bitplanes decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=Arnold%20transform" title=" Arnold transform"> Arnold transform</a>, <a href="https://publications.waset.org/abstracts/search?q=lossless%20image%20encryption" title=" lossless image encryption"> lossless image encryption</a> </p> <a href="https://publications.waset.org/abstracts/14570/bitplanes-image-encryptiondecryption-using-edge-map-sspce-method-and-arnold-transform" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14570.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">497</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">40</span> Voice Liveness Detection Using Kolmogorov Arnold Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arth%20J.%20Shah">Arth J. Shah</a>, <a href="https://publications.waset.org/abstracts/search?q=Madhu%20R.%20Kamble"> Madhu R. Kamble</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Voice biometric liveness detection is customized to certify an authentication process of the voice data presented is genuine and not a recording or synthetic voice. With the rise of deepfakes and other equivalently sophisticated spoofing generation techniques, it’s becoming challenging to ensure that the person on the other end is a live speaker or not. Voice Liveness Detection (VLD) system is a group of security measures which detect and prevent voice spoofing attacks. Motivated by the recent development of the Kolmogorov-Arnold Network (KAN) based on the Kolmogorov-Arnold theorem, we proposed KAN for the VLD task. To date, multilayer perceptron (MLP) based classifiers have been used for the classification tasks. We aim to capture not only the compositional structure of the model but also to optimize the values of univariate functions. This study explains the mathematical as well as experimental analysis of KAN for VLD tasks, thereby opening a new perspective for scientists to work on speech and signal processing-based tasks. This study emerges as a combination of traditional signal processing tasks and new deep learning models, which further proved to be a better combination for VLD tasks. The experiments are performed on the POCO and ASVSpoof 2017 V2 database. We used Constant Q-transform, Mel, and short-time Fourier transform (STFT) based front-end features and used CNN, BiLSTM, and KAN as back-end classifiers. The best accuracy is 91.26 % on the POCO database using STFT features with the KAN classifier. In the ASVSpoof 2017 V2 database, the lowest EER we obtained was 26.42 %, using CQT features and KAN as a classifier. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kolmogorov%20Arnold%20networks" title="Kolmogorov Arnold networks">Kolmogorov Arnold networks</a>, <a href="https://publications.waset.org/abstracts/search?q=multilayer%20perceptron" title=" multilayer perceptron"> multilayer perceptron</a>, <a href="https://publications.waset.org/abstracts/search?q=pop%20noise" title=" pop noise"> pop noise</a>, <a href="https://publications.waset.org/abstracts/search?q=voice%20liveness%20detection" title=" voice liveness detection"> voice liveness detection</a> </p> <a href="https://publications.waset.org/abstracts/187492/voice-liveness-detection-using-kolmogorov-arnold-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187492.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">39</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">39</span> An Efficient Encryption Scheme Using DWT and Arnold Transforms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Abdrhman%20M.%20Ukasha">Ali Abdrhman M. Ukasha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=color%20image" title="color image">color image</a>, <a href="https://publications.waset.org/abstracts/search?q=wavelet%20transform" title=" wavelet transform"> wavelet transform</a>, <a href="https://publications.waset.org/abstracts/search?q=edge%20detector" title=" edge detector"> edge detector</a>, <a href="https://publications.waset.org/abstracts/search?q=Arnold%20transform" title=" Arnold transform"> Arnold transform</a>, <a href="https://publications.waset.org/abstracts/search?q=lossy%20image%20encryption" title=" lossy image encryption"> lossy image encryption</a> </p> <a href="https://publications.waset.org/abstracts/16468/an-efficient-encryption-scheme-using-dwt-and-arnold-transforms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16468.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">482</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">38</span> Robust Data Image Watermarking for Data Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Harsh%20Vikram%20Singh">Harsh Vikram Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Ankur%20Rai"> Ankur Rai</a>, <a href="https://publications.waset.org/abstracts/search?q=Anand%20Mohan"> Anand Mohan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20hiding" title="data hiding">data hiding</a>, <a href="https://publications.waset.org/abstracts/search?q=watermarking" title=" watermarking"> watermarking</a>, <a href="https://publications.waset.org/abstracts/search?q=DCT" title=" DCT"> DCT</a>, <a href="https://publications.waset.org/abstracts/search?q=chaotic%20sequence" title=" chaotic sequence"> chaotic sequence</a>, <a href="https://publications.waset.org/abstracts/search?q=arnold%20transforms" title=" arnold transforms"> arnold transforms</a> </p> <a href="https://publications.waset.org/abstracts/29055/robust-data-image-watermarking-for-data-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29055.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">515</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37</span> Multilevel Gray Scale Image Encryption through 2D Cellular Automata</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rupali%20Bhardwaj">Rupali Bhardwaj</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=scrambling" title="scrambling">scrambling</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular%20automata" title=" cellular automata"> cellular automata</a>, <a href="https://publications.waset.org/abstracts/search?q=Arnold%20cat%20map" title=" Arnold cat map"> Arnold cat map</a>, <a href="https://publications.waset.org/abstracts/search?q=game%20of%20life" title=" game of life"> game of life</a>, <a href="https://publications.waset.org/abstracts/search?q=gray%20difference%20degree" title=" gray difference degree"> gray difference degree</a>, <a href="https://publications.waset.org/abstracts/search?q=correlation%20coefficient" title=" correlation coefficient"> correlation coefficient</a> </p> <a href="https://publications.waset.org/abstracts/41177/multilevel-gray-scale-image-encryption-through-2d-cellular-automata" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41177.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">377</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">36</span> Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=D.%20M.%20S.%20Bandara">D. M. S. Bandara</a>, <a href="https://publications.waset.org/abstracts/search?q=Yunqi%20Lei"> Yunqi Lei</a>, <a href="https://publications.waset.org/abstracts/search?q=Ye%20Luo"> Ye Luo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fingerprints are suitable as long-term markers of human identity since they provide detailed and unique individual features which are difficult to alter and durable over life time. In this paper, we propose an algorithm to encrypt and decrypt fingerprint images by using a specially designed Elliptic Curve Cryptography (ECC) procedure based on block ciphers. In addition, to increase the confusing effect of fingerprint encryption, we also utilize a chaotic-behaved method called Arnold Cat Map (ACM) for a 2D scrambling of pixel locations in our method. Experimental results are carried out with various types of efficiency and security analyses. As a result, we demonstrate that the proposed fingerprint encryption/decryption algorithm is advantageous in several different aspects including efficiency, security and flexibility. In particular, using this algorithm, we achieve a margin of about 0.1% in the test of Number of Pixel Changing Rate (NPCR) values comparing to the-state-of-the-art performances. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arnold%20cat%20map" title="arnold cat map">arnold cat map</a>, <a href="https://publications.waset.org/abstracts/search?q=biometric%20encryption" title=" biometric encryption"> biometric encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=block%20cipher" title=" block cipher"> block cipher</a>, <a href="https://publications.waset.org/abstracts/search?q=elliptic%20curve%20cryptography" title=" elliptic curve cryptography"> elliptic curve cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=fingerprint%20encryption" title=" fingerprint encryption"> fingerprint encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=Koblitz%E2%80%99s%20%20encoding" title=" Koblitz’s encoding"> Koblitz’s encoding</a> </p> <a href="https://publications.waset.org/abstracts/96251/fingerprint-image-encryption-using-a-2d-chaotic-map-and-elliptic-curve-cryptography" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96251.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">204</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">35</span> Yu Kwang-Chung vs. Yu Kwang-Chung: Untranslatability as the Touchstone of a Poet</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Min-Hua%20Wu">Min-Hua Wu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The untranslatability of an established poet’s tour de force is thoroughly explored by Matthew Arnold (1822-1888). In his On Translating Homer (1861), Arnold lists the four most striking poetic qualities of Homer, namely his rapidity, plainness and directness of style and diction, plainness and directness of ideas, and nobleness. He concludes that such celebrated English translators as Cowper, Pope, Chapman, and Mr. Newman are all doomed, due to their respective failure in rendering the totality of the four Homeric poetic qualities. Why poetic translation always amounts to being proven such a mission impossible for the translator? According to Arnold, it is because there constantly exists a mist interposed between the translator’s own literary self-obsession and the objective artistic qualities that reside in the work of the original author. Foregrounding such a seemingly empowering yet actually detrimental poetic mist, he explains why the aforementioned translators fail in their attempts to bring the Homeric charm to the British reader. Drawing on Arnold’s analytical study on Homeric translation, the research attempts to bring Yu Kwang-chung the poet vis-à-vis Yu Kwang-chung the translator, with an aim not so much to find any similar mist as revealed by Arnold between his Chinese poetry and English translation as to probe into a latent and veiled literary and lingual mist interposed between Chinese and English, if not between Chinese and English literatures. The major work studied and analyzed for this study is Yu’s own Chinese poetry and his own English translation collected in The Night Watchman: Yu Kwang-chung 1958-2004. The research argues that the following critical elements that characterizes Yu’s poetics are to a certain extent 'transformed,' if not 'lost,' in his English translation: a. the Chinese pictographic and ideographic unit terms which so unfailingly characterize the poet’s incredible creativity, allowing him to habitually and conveniently coin concrete textual images or word-scapes almost at his own will; b. the subtle wordplay and punning which appear at a reasonable frequency; c. the parallel contrastive repetitive syntactic structure within a single poetic line; d. the ambiguous and highly associative diction in the adjective and noun categories; e. the literary allusion that harks back to the old times of Chinese literature; f. the alliteration that adds rhythm and smoothness to the lines; g. the rhyming patterns that bring about impressive sonority and lingering echo to the ears of the reader; h. the grandeur-imposing and sublimity-arousing word-scaping which hinges on the employment of verbs; i. the meandering cultural heritage that embraces such elements as Chinese medicine and kung fu; and j. other features of the like. Once we appeal to the Arnoldian tribunal and resort to the strict standards of such a Victorian cultural and literary critic who insists 'to see the object as in itself it really is,' we may serve as a potential judge for the tug of war between Yu Kwang-chung the poet and Yu Kwang-chung the translator, a tug of war that will not merely broaden our understating of Chinese poetics but deepen our apprehension of Chinese-English translatology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yu%20Kwang-chung" title="Yu Kwang-chung">Yu Kwang-chung</a>, <a href="https://publications.waset.org/abstracts/search?q=The%20Night%20Watchman" title=" The Night Watchman"> The Night Watchman</a>, <a href="https://publications.waset.org/abstracts/search?q=poetry%20translation" title=" poetry translation"> poetry translation</a>, <a href="https://publications.waset.org/abstracts/search?q=Chinese-English%20translation" title=" Chinese-English translation"> Chinese-English translation</a>, <a href="https://publications.waset.org/abstracts/search?q=translation%20studies" title=" translation studies"> translation studies</a>, <a href="https://publications.waset.org/abstracts/search?q=Matthew%20Arnold" title=" Matthew Arnold"> Matthew Arnold</a> </p> <a href="https://publications.waset.org/abstracts/84232/yu-kwang-chung-vs-yu-kwang-chung-untranslatability-as-the-touchstone-of-a-poet" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84232.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">34</span> Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20A.%20Ukasha">Ali A. Ukasha</a>, <a href="https://publications.waset.org/abstracts/search?q=Majdi%20F.%20Elbireki"> Majdi F. Elbireki</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20F.%20Abdullah"> Mohammad F. Abdullah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SSPCE%20method" title="SSPCE method">SSPCE method</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20compression%20and%20salt%20and%20peppers%20attacks" title=" image compression and salt and peppers attacks"> image compression and salt and peppers attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=bitplanes%20decomposition" title=" bitplanes decomposition"> bitplanes decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=Arnold%20transform" title=" Arnold transform"> Arnold transform</a>, <a href="https://publications.waset.org/abstracts/search?q=color%20image" title=" color image"> color image</a>, <a href="https://publications.waset.org/abstracts/search?q=wavelet%20transform" title=" wavelet transform"> wavelet transform</a>, <a href="https://publications.waset.org/abstracts/search?q=lossless%20image%20encryption" title=" lossless image encryption"> lossless image encryption</a> </p> <a href="https://publications.waset.org/abstracts/18519/color-image-compressionencryptioncontour-extraction-using-3l-dwt-and-sspce-method" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18519.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">518</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">33</span> Music of a Film City: Interwar Europe in Los Angeles, 1930s</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alexander%20Rosenblatt">Alexander Rosenblatt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The musical culture of the city of Los Angeles, as it is seen today, developed not without the influence of outstanding musicians who came from Europe during the period between the world wars. The combination of European modernist ideas with American musical culture, which differed in many ways from European musical culture, led to unique results. During the 1920s and even more so in the 1930s, members of the Austrian-German artistic intelligentsia, particularly those of Jewish origin who felt insecure in their homeland, began to look for a safer place. The United States has become such a place for many, and many of them chose the second largest metropolis—Los Angeles. The most notable figure in this group was the modernist composer Arnold Schoenberg. Other famous musicians were conductors Otto Klemperer and Bruno Walter. The study focused on how these people acclimated to a city whose culture and business revolved around film production; what place the conductors Klemperer and Walter occupied in the city, state, and country; how Schoenberg, whose musical style was little understood by the American public, was able to realize himself; what path he took when he was accepted to two universities as a professor of counterpoint and composition; and whether he revised his own views on the development of Western music. Another aspect was the study of how the composer’s memory was preserved in the universities where he taught. The study is based primarily on materials found in four libraries of two universities located in Los Angeles, UCLA and USC, during my tenure as a visiting scholar at USC Thornton School of Music (August 2023), to be completed during my upcoming visit there in August-September 2024, as well as on interviews with people active in efforts to keep Schoenberg’s memory alive on the USC Campus. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=los%20angeles" title="los angeles">los angeles</a>, <a href="https://publications.waset.org/abstracts/search?q=filmmaking" title=" filmmaking"> filmmaking</a>, <a href="https://publications.waset.org/abstracts/search?q=immigrant%20musicians" title=" immigrant musicians"> immigrant musicians</a>, <a href="https://publications.waset.org/abstracts/search?q=arnold%20schoenberg" title=" arnold schoenberg"> arnold schoenberg</a>, <a href="https://publications.waset.org/abstracts/search?q=otto%20klemperer" title=" otto klemperer"> otto klemperer</a>, <a href="https://publications.waset.org/abstracts/search?q=bruno%20walter" title=" bruno walter"> bruno walter</a> </p> <a href="https://publications.waset.org/abstracts/187905/music-of-a-film-city-interwar-europe-in-los-angeles-1930s" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187905.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">26</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">32</span> On the Mathematical Modelling of Aggregative Stability of Disperse Systems </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arnold%20M.%20Brener">Arnold M. Brener</a>, <a href="https://publications.waset.org/abstracts/search?q=Lesbek%20Tashimov"> Lesbek Tashimov</a>, <a href="https://publications.waset.org/abstracts/search?q=Ablakim%20S.%20Muratov"> Ablakim S. Muratov</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper deals with the special model for coagulation kernels which represents new control parameters in the Smoluchowski equation for binary aggregation. On the base of the model the new approach to evaluating aggregative stability of disperse systems has been submitted. With the help of this approach the simple estimates for aggregative stability of various types of hydrophilic nano-suspensions have been obtained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aggregative%20stability" title="aggregative stability">aggregative stability</a>, <a href="https://publications.waset.org/abstracts/search?q=coagulation%20kernels" title=" coagulation kernels"> coagulation kernels</a>, <a href="https://publications.waset.org/abstracts/search?q=disperse%20systems" title=" disperse systems"> disperse systems</a>, <a href="https://publications.waset.org/abstracts/search?q=mathematical%20model" title=" mathematical model"> mathematical model</a> </p> <a href="https://publications.waset.org/abstracts/10336/on-the-mathematical-modelling-of-aggregative-stability-of-disperse-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10336.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">309</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">31</span> Efficient Design of Distribution Logistics by Using a Model-Based Decision Support System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J.%20Becker">J. Becker</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Arnold"> R. Arnold</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The design of distribution logistics has a decisive impact on a company's logistics costs and performance. Hence, such solutions make an essential contribution to corporate success. This article describes a decision support system for analyzing the potential of distribution logistics in terms of logistics costs and performance. In contrast to previous procedures of business process re-engineering (BPR), this method maps distribution logistics holistically under variable distribution structures. Combined with qualitative measures the decision support system will contribute to a more efficient design of distribution logistics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=decision%20support%20system" title="decision support system">decision support system</a>, <a href="https://publications.waset.org/abstracts/search?q=distribution%20logistics" title=" distribution logistics"> distribution logistics</a>, <a href="https://publications.waset.org/abstracts/search?q=potential%20analyses" title=" potential analyses"> potential analyses</a>, <a href="https://publications.waset.org/abstracts/search?q=supply%20chain%20management" title=" supply chain management"> supply chain management</a> </p> <a href="https://publications.waset.org/abstracts/44230/efficient-design-of-distribution-logistics-by-using-a-model-based-decision-support-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44230.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">406</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">30</span> Response Solutions of 2-Dimensional Elliptic Degenerate Quasi-Periodic Systems With Small Parameters</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Song%20Ni">Song Ni</a>, <a href="https://publications.waset.org/abstracts/search?q=Junxiang%20Xu"> Junxiang Xu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper concerns quasi-periodic perturbations with parameters of 2-dimensional degenerate systems. If the equilibrium point of the unperturbed system is elliptic-type degenerate. Assume that the perturbation is real analytic quasi-periodic with diophantine frequency. Without imposing any assumption on the perturbation, we can use a path of equilibrium points to tackle with the Melnikov non-resonance condition, then by the Leray-Schauder Continuation Theorem and the Kolmogorov-Arnold-Moser technique, it is proved that the equation has a small response solution for many sufficiently small parameters. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=quasi-periodic%20systems" title="quasi-periodic systems">quasi-periodic systems</a>, <a href="https://publications.waset.org/abstracts/search?q=KAM-iteration" title=" KAM-iteration"> KAM-iteration</a>, <a href="https://publications.waset.org/abstracts/search?q=degenerate%20equilibrium%20point" title=" degenerate equilibrium point"> degenerate equilibrium point</a>, <a href="https://publications.waset.org/abstracts/search?q=response%20solution" title=" response solution"> response solution</a> </p> <a href="https://publications.waset.org/abstracts/175183/response-solutions-of-2-dimensional-elliptic-degenerate-quasi-periodic-systems-with-small-parameters" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/175183.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">29</span> Truthful or Untruthful Social Media Posts: Applying Statement Analysis to Decode online Deception</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Christa%20L.%20Arnold">Christa L. Arnold</a>, <a href="https://publications.waset.org/abstracts/search?q=Margaret%20C.%20Stewart"> Margaret C. Stewart</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research shares the results of an exploratory study examining Statement Analysis (SA) to detect deception in online truthful and untruthful social media posts. Applying a Law Enforcement methodology SA, used in criminal interview statements, this research analyzes what is stated to assist in evaluating written deceptive information. Preliminary findings reveal qualitative and quantitative nuances for SA in online deception detection and uncover insights regarding digital deceptive behavior. Thus far, findings reveal truthful statements tend to differ from untruthful statements in both content and quality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deception%20detection" title="deception detection">deception detection</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20deception" title=" online deception"> online deception</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media%20content" title=" social media content"> social media content</a>, <a href="https://publications.waset.org/abstracts/search?q=statement%20analysis" title=" statement analysis"> statement analysis</a> </p> <a href="https://publications.waset.org/abstracts/162381/truthful-or-untruthful-social-media-posts-applying-statement-analysis-to-decode-online-deception" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162381.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">64</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">28</span> Development of Ferrous-Aluminum Alloys from Recyclable Material by High Energy Milling </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arnold%20S.%20Freitas%20Neto">Arnold S. Freitas Neto</a>, <a href="https://publications.waset.org/abstracts/search?q=Rodrigo%20E.%20Coelho"> Rodrigo E. Coelho</a>, <a href="https://publications.waset.org/abstracts/search?q=Erick%20S.%20Mendon%C3%A7a"> Erick S. Mendonça</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aimed to obtain an alloy of Iron and Aluminum in the proportion of 50% of atomicity for each constituent. Alloys were obtained by processing recycled aluminum and chips of 1200 series carbon steel in a high-energy mill. For the experiment, raw materials were processed thorough high energy milling before mixing the substances. Subsequently, the mixture of 1200 series carbon steel and Aluminum powder was carried out a milling process. Thereafter, hot compression was performed in a closed die in order to obtain the samples. The pieces underwent heat treatments, sintering and aging. Lastly, the composition and the mechanical properties of their hardness were analyzed. In this paper, results are compared with previous studies, which used iron powder of high purity instead of Carbon steel in the composition. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fe-Al%20alloys" title="Fe-Al alloys">Fe-Al alloys</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20energy%20milling" title=" high energy milling"> high energy milling</a>, <a href="https://publications.waset.org/abstracts/search?q=metallography%20characterization" title=" metallography characterization"> metallography characterization</a>, <a href="https://publications.waset.org/abstracts/search?q=powder%20metallurgy" title=" powder metallurgy"> powder metallurgy</a> </p> <a href="https://publications.waset.org/abstracts/57596/development-of-ferrous-aluminum-alloys-from-recyclable-material-by-high-energy-milling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57596.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">309</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27</span> A Futuristic Look at American Indian Nationhood: Zits in Sherman Alexie’s Flight</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shaimaa%20Alobaidi">Shaimaa Alobaidi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The presentation examines how urbanization opens possibilities for American Indian characters like Zits in Alexie’s Flightto explore new definitionsoftheirtribal self-identification. Zits travels in time and views the world from different bodies, ages, and races; his journeys end with different perspectives on the idea of nationhood as an American Indian. He is an example of Vine Deloria’s statementthat “urban Indians have become the cutting edge of the new Indian nationalism” (248). Flight is chosen because the momentZits leaves the real world for time-traveling adventures is very critical; it is a moment of rage that ends in the mass murder of many Anglo-Americans. The paper focus on the turning point when he returns into his body with new opportunities towards his existence among the majority of anglo-Americans who cannot help but see him American Indian minority in need of help and assistance. Characters, such as Zits, attempt to outlive alienation, and Alexie gives new definitionsof their ethnic nationhood. Futuristicdoes not mean the very far unpredictable future; it is rather a nearpotential future for teenagers of American Indians, like Zits, Arnold, andCoyoteSprings- the band in ReservationBlues; all revolutionary personalitiesin Alexie’s works. They will be analyzed as Gerald Vizenor’s “postindianwarriors” who have the ability to identify Indigenous nationalism in a post-colonial context. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=alienation" title="alienation">alienation</a>, <a href="https://publications.waset.org/abstracts/search?q=self-identification" title="self-identification">self-identification</a>, <a href="https://publications.waset.org/abstracts/search?q=nationhood" title=" nationhood"> nationhood</a>, <a href="https://publications.waset.org/abstracts/search?q=urbanization" title=" urbanization"> urbanization</a>, <a href="https://publications.waset.org/abstracts/search?q=postindian" title=" postindian"> postindian</a> </p> <a href="https://publications.waset.org/abstracts/144010/a-futuristic-look-at-american-indian-nationhood-zits-in-sherman-alexies-flight" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144010.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26</span> Robust Quantum Image Encryption Algorithm Leveraging 3D-BNM Chaotic Maps and Controlled Qubit-Level Operations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vivek%20Verma">Vivek Verma</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanjeev%20Kumar"> Sanjeev Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study presents a novel quantum image encryption algorithm, using a 3D chaotic map and controlled qubit-level scrambling operations. The newly proposed 3D-BNM chaotic map effectively reduces the degradation of chaotic dynamics resulting from the finite word length effect. It facilitates the generation of highly unpredictable random sequences and enhances chaotic performance. The system’s efficacy is additionally enhanced by the inclusion of a SHA-256 hash function. Initially, classical plain images are converted into their quantum equivalents using the Novel Enhanced Quantum Representation (NEQR) model. The Generalized Quantum Arnold Transformation (GQAT) is then applied to disrupt the coordinate information of the quantum image. Subsequently, to diffuse the pixel values of the scrambled image, XOR operations are performed using pseudorandom sequences generated by the 3D-BNM chaotic map. Furthermore, to enhance the randomness and reduce the correlation among the pixels in the resulting cipher image, a controlled qubit-level scrambling operation is employed. The encryption process utilizes fundamental quantum gates such as C-NOT and CCNOT. Both theoretical and numerical simulations validate the effectiveness of the proposed algorithm against various statistical and differential attacks. Moreover, the proposed encryption algorithm operates with low computational complexity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=3D%20Chaotic%20map" title="3D Chaotic map">3D Chaotic map</a>, <a href="https://publications.waset.org/abstracts/search?q=SHA-256" title=" SHA-256"> SHA-256</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20image%20encryption" title=" quantum image encryption"> quantum image encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=Qubit%20level%20scrambling" title=" Qubit level scrambling"> Qubit level scrambling</a>, <a href="https://publications.waset.org/abstracts/search?q=NEQR" title=" NEQR"> NEQR</a> </p> <a href="https://publications.waset.org/abstracts/193776/robust-quantum-image-encryption-algorithm-leveraging-3d-bnm-chaotic-maps-and-controlled-qubit-level-operations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193776.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">10</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25</span> Predictive Maintenance of Industrial Shredders: Efficient Operation through Real-Time Monitoring Using Statistical Machine Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Federico%20Pittino">Federico Pittino</a>, <a href="https://publications.waset.org/abstracts/search?q=Thomas%20Arnold"> Thomas Arnold</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The shredding of waste materials is a key step in the recycling process towards the circular economy. Industrial shredders for waste processing operate in very harsh operating conditions, leading to the need for frequent maintenance of critical components. Maintenance optimization is particularly important also to increase the machine’s efficiency, thereby reducing the operational costs. In this work, a monitoring system has been developed and deployed on an industrial shredder located at a waste recycling plant in Austria. The machine has been monitored for one year, and methods for predictive maintenance have been developed for two key components: the cutting knives and the drive belt. The large amount of collected data is leveraged by statistical machine learning techniques, thereby not requiring very detailed knowledge of the machine or its live operating conditions. The results show that, despite the wide range of operating conditions, a reliable estimate of the optimal time for maintenance can be derived. Moreover, the trade-off between the cost of maintenance and the increase in power consumption due to the wear state of the monitored components of the machine is investigated. This work proves the benefits of real-time monitoring system for the efficient operation of industrial shredders. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=predictive%20maintenance" title="predictive maintenance">predictive maintenance</a>, <a href="https://publications.waset.org/abstracts/search?q=circular%20economy" title=" circular economy"> circular economy</a>, <a href="https://publications.waset.org/abstracts/search?q=industrial%20shredder" title=" industrial shredder"> industrial shredder</a>, <a href="https://publications.waset.org/abstracts/search?q=cost%20optimization" title=" cost optimization"> cost optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=statistical%20machine%20learning" title=" statistical machine learning"> statistical machine learning</a> </p> <a href="https://publications.waset.org/abstracts/135437/predictive-maintenance-of-industrial-shredders-efficient-operation-through-real-time-monitoring-using-statistical-machine-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135437.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">124</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">24</span> Contribution to the Development of a New Design of Dentist's Gowns: A Case Study of Using Infra-Red Technology and Pressure Sensors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tran%20Thi%20Anh%20Dao">Tran Thi Anh Dao</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Arnold"> M. Arnold</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Schacher"> L. Schacher</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20C.%20Adolphe"> D. C. Adolphe</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20Reys"> G. Reys</a> </p> <p class="card-text"><strong>Abstract:</strong></p> During tooth extraction or implant surgery, dentists are in contact with numerous infectious germs from patients' saliva and blood. For that reason, dentist's clothes have to play their role of protection from contamination. In addition, dentist's apparels should be not only protective but also comfortable and breathable because dentists have to perform many operations and treatments on patients throughout the day with high concentration and intensity. However, this type of protective garments has not been studied scientifically, whereas dentists are facing new risks and eager for looking for a comfortable personal protective equipment. For that reason, we have proposed some new designs of dentist's gown. They were expected to diminish heat accumulation that are considered as an important factor in reducing the level of comfort experienced by users. Experiments using infra-red technology were carried out in order to compare the breathable properties between a traditional gown and a new design with open zones. Another experiment using pressure sensors was also carried out to study ergonomic aspects trough the flexibility of movements of sleeves. The sleeves-design which is considered comfortable and flexible will be chosen for the further step. The results from the two experiments provide valuable information for the development of a new design of dentists' gowns in order to achieve maximum levels of cooling and comfort for the human body. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=garment" title="garment">garment</a>, <a href="https://publications.waset.org/abstracts/search?q=dentists" title=" dentists"> dentists</a>, <a href="https://publications.waset.org/abstracts/search?q=comfort" title=" comfort"> comfort</a>, <a href="https://publications.waset.org/abstracts/search?q=design" title=" design"> design</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=thermal" title=" thermal"> thermal</a> </p> <a href="https://publications.waset.org/abstracts/74264/contribution-to-the-development-of-a-new-design-of-dentists-gowns-a-case-study-of-using-infra-red-technology-and-pressure-sensors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74264.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">219</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">23</span> A Convergent Interacting Particle Method for Computing Kpp Front Speeds in Random Flows</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tan%20Zhang">Tan Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhongjian%20Wang"> Zhongjian Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Jack%20Xin"> Jack Xin</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhiwen%20Zhang"> Zhiwen Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We aim to efficiently compute the spreading speeds of reaction-diffusion-advection (RDA) fronts in divergence-free random flows under the Kolmogorov-Petrovsky-Piskunov (KPP) nonlinearity. We study a stochastic interacting particle method (IPM) for the reduced principal eigenvalue (Lyapunov exponent) problem of an associated linear advection-diffusion operator with spatially random coefficients. The Fourier representation of the random advection field and the Feynman-Kac (FK) formula of the principal eigenvalue (Lyapunov exponent) form the foundation of our method implemented as a genetic evolution algorithm. The particles undergo advection-diffusion and mutation/selection through a fitness function originated in the FK semigroup. We analyze the convergence of the algorithm based on operator splitting and present numerical results on representative flows such as 2D cellular flow and 3D Arnold-Beltrami-Childress (ABC) flow under random perturbations. The 2D examples serve as a consistency check with semi-Lagrangian computation. The 3D results demonstrate that IPM, being mesh-free and self-adaptive, is simple to implement and efficient for computing front spreading speeds in the advection-dominated regime for high-dimensional random flows on unbounded domains where no truncation is needed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=KPP%20front%20speeds" title="KPP front speeds">KPP front speeds</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20flows" title=" random flows"> random flows</a>, <a href="https://publications.waset.org/abstracts/search?q=Feynman-Kac%20semigroups" title=" Feynman-Kac semigroups"> Feynman-Kac semigroups</a>, <a href="https://publications.waset.org/abstracts/search?q=interacting%20particle%20method" title=" interacting particle method"> interacting particle method</a>, <a href="https://publications.waset.org/abstracts/search?q=convergence%20analysis" title=" convergence analysis"> convergence analysis</a> </p> <a href="https://publications.waset.org/abstracts/185128/a-convergent-interacting-particle-method-for-computing-kpp-front-speeds-in-random-flows" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185128.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">46</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">22</span> Executive Function in Youth With ADHD and ASD: A Systematic Review and Meta-analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Parker%20Townes">Parker Townes</a>, <a href="https://publications.waset.org/abstracts/search?q=Prabdeep%20Panesar"> Prabdeep Panesar</a>, <a href="https://publications.waset.org/abstracts/search?q=Chunlin%20Liu"> Chunlin Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Soo%20Youn%20Lee"> Soo Youn Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Dan%20Devoe"> Dan Devoe</a>, <a href="https://publications.waset.org/abstracts/search?q=Paul%20D.%20Arnold"> Paul D. Arnold</a>, <a href="https://publications.waset.org/abstracts/search?q=Jennifer%20Crosbie"> Jennifer Crosbie</a>, <a href="https://publications.waset.org/abstracts/search?q=Russell%20Schachar"> Russell Schachar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Attention-deficit hyperactivity disorder (ADHD) and autism spectrum disorder (ASD) are impairing childhood neurodevelopmental disorders with problems in executive functions. Executive functions are higher-level mental processes essential for daily functioning and goal attainment. There is genetic and neural overlap between ADHD and ASD. The aim of this meta-analysis was to evaluate if pediatric ASD and ADHD have distinct executive function profiles. This review was completed following Cochrane guidelines. Fifty-eight articles were identified through database searching, followed by a blinded screening in duplicate. A meta-analysis was performed for all task performance metrics evaluated by at least two articles. Forty-five metrics from 24 individual tasks underwent analysis. No differences were found between youth with ASD and ADHD in any domain under direct comparison. However, individuals with ASD and ADHD exhibited deficient attention, flexibility, visuospatial abilities, working memory, processing speed, and response inhibition compared to controls. No deficits in planning were noted in either disorder. Only 11 studies included a group with comorbid ASD+ADHD, making it difficult to determine whether common executive function deficits are a function of comorbidity. Further research is needed to determine if comorbidity accounts for the apparent commonality in executive function between ASD and ADHD. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=autism%20spectrum%20disorder" title="autism spectrum disorder">autism spectrum disorder</a>, <a href="https://publications.waset.org/abstracts/search?q=ADHD" title=" ADHD"> ADHD</a>, <a href="https://publications.waset.org/abstracts/search?q=neurocognition" title=" neurocognition"> neurocognition</a>, <a href="https://publications.waset.org/abstracts/search?q=executive%20function" title=" executive function"> executive function</a>, <a href="https://publications.waset.org/abstracts/search?q=youth" title=" youth"> youth</a> </p> <a href="https://publications.waset.org/abstracts/156448/executive-function-in-youth-with-adhd-and-asd-a-systematic-review-and-meta-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156448.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">21</span> Diffusion Mechanism of Aroma Compound (2-Acetyl-1-Pyrroline) in Rice During Storage</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mary%20Ann%20U.%20Baradi">Mary Ann U. Baradi</a>, <a href="https://publications.waset.org/abstracts/search?q=Arnold%20R.%20Elepa%C3%B1o"> Arnold R. Elepaño</a>, <a href="https://publications.waset.org/abstracts/search?q=Manuel%20Jose%20C.%20Regalado"> Manuel Jose C. Regalado</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Aromatic rice has become popular and continues to command higher price than ordinary rice because of its distinctive scent that makes it special. Freshly harvested aromatic rice exhibits strong aromatic scent but decreases with time and conditions during storage. Of the many volatile compounds in aromatic rice, 2-acetyl-1-pyrroline (2AP) is a major compound that gives rice its popcorn-like aroma. The diffusion mechanism of 2AP in rice was investigated. Semi-empirical models explaining 2AP diffusion as affected by temperature and duration were developed. Storage time and temperature affected 2AP loss via diffusion. The amount of 2AP in rice decreased with time. Free 2AP, being volatile, is lost due to diffusion. Storage experiment indicated rapid 2AP loss during the first five weeks and subsequently leveled off afterwards; attaining level of starch bound 2AP. Decline of 2AP during storage followed exponential equation and exhibited four stages; i.e. the initial, second, third and final stage. Free 2AP is easily lost while bound 2AP is left, only to be released upon exposure to high temperature such as cooking. Both free and bound 2AP is found in endosperm while free 2AP is in the bran. Around 63–67% of total 2AP was lost in brown and milled rice of MS 6 paddy kept at ambient. Samples stored at higher temperature (27°C) recorded higher 2AP loss than those kept at lower temperature (15°C). The study should be able to guide processors in understanding and controlling parameters in storage to produce high quality rice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=2-acetyl-1-pyrroline" title="2-acetyl-1-pyrroline">2-acetyl-1-pyrroline</a>, <a href="https://publications.waset.org/abstracts/search?q=aromatic%20rice" title=" aromatic rice"> aromatic rice</a>, <a href="https://publications.waset.org/abstracts/search?q=diffusion%20mechanism" title=" diffusion mechanism"> diffusion mechanism</a>, <a href="https://publications.waset.org/abstracts/search?q=storage" title=" storage "> storage </a> </p> <a href="https://publications.waset.org/abstracts/14755/diffusion-mechanism-of-aroma-compound-2-acetyl-1-pyrroline-in-rice-during-storage" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14755.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">338</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">20</span> Agency Cost, Firm Performance, Corporate Governance: Evidence from Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arnold%20Sanda%20Layuk">Arnold Sanda Layuk</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fraud in the disclosure of financial statements by management shows that agency conflict is an important issue in the company. The conflict has consequences for the agency costs that must be borne and has an impact on the firm's performance. The effect of agency costs on firm performance is investigated in this study, as well as whether several variables such as corporate governance mechanisms can positively moderate the agency cost and firm performance relationship. The agency cost is measured by the asset utilization ratio and discretionary expenditure ratio. The firm's performance is represented by the return on equity. Data was collected from the manufacturing companies listed on the Indonesia Stock Exchange from 2015 to 2019, then regressed on the panel data using the panel corrected standard error model (PCSE). According to the findings, agency costs are negatively related to firm performance, which supports previous empirical research findings. It also found that the agency cost and firm performance relationship is significantly moderated by board size and ownership concentration as the representatives of corporate governance mechanisms. It suggests that corporate governance can become tools to reduce agency costs and increase firm performance as well. The empirical evidence adds to previous research on agency conflict, particularly in emerging markets. These findings are expected to supplement previous research and provide additional information to shareholders in order to control opportunistic management decisions that affect their investments and discretionary operational expenses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=agency%20cost" title="agency cost">agency cost</a>, <a href="https://publications.waset.org/abstracts/search?q=corporate%20governance" title=" corporate governance"> corporate governance</a>, <a href="https://publications.waset.org/abstracts/search?q=asset%20utilization%20ratio" title=" asset utilization ratio"> asset utilization ratio</a>, <a href="https://publications.waset.org/abstracts/search?q=firm%20performance" title=" firm performance"> firm performance</a> </p> <a href="https://publications.waset.org/abstracts/139702/agency-cost-firm-performance-corporate-governance-evidence-from-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139702.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">193</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">19</span> ISMARA: Completely Automated Inference of Gene Regulatory Networks from High-Throughput Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Piotr%20J.%20Balwierz">Piotr J. Balwierz</a>, <a href="https://publications.waset.org/abstracts/search?q=Mikhail%20Pachkov"> Mikhail Pachkov</a>, <a href="https://publications.waset.org/abstracts/search?q=Phil%20Arnold"> Phil Arnold</a>, <a href="https://publications.waset.org/abstracts/search?q=Andreas%20J.%20Gruber"> Andreas J. Gruber</a>, <a href="https://publications.waset.org/abstracts/search?q=Mihaela%20Zavolan"> Mihaela Zavolan</a>, <a href="https://publications.waset.org/abstracts/search?q=Erik%20van%20Nimwegen"> Erik van Nimwegen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Understanding the key players and interactions in the regulatory networks that control gene expression and chromatin state across different cell types and tissues in metazoans remains one of the central challenges in systems biology. Our laboratory has pioneered a number of methods for automatically inferring core gene regulatory networks directly from high-throughput data by modeling gene expression (RNA-seq) and chromatin state (ChIP-seq) measurements in terms of genome-wide computational predictions of regulatory sites for hundreds of transcription factors and micro-RNAs. These methods have now been completely automated in an integrated webserver called ISMARA that allows researchers to analyze their own data by simply uploading RNA-seq or ChIP-seq data sets and provides results in an integrated web interface as well as in downloadable flat form. For any data set, ISMARA infers the key regulators in the system, their activities across the input samples, the genes and pathways they target, and the core interactions between the regulators. We believe that by empowering experimental researchers to apply cutting-edge computational systems biology tools to their data in a completely automated manner, ISMARA can play an important role in developing our understanding of regulatory networks across metazoans. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gene%20expression%20analysis" title="gene expression analysis">gene expression analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=high-throughput%20sequencing%20analysis" title=" high-throughput sequencing analysis"> high-throughput sequencing analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=transcription%20factor%20activity" title=" transcription factor activity"> transcription factor activity</a>, <a href="https://publications.waset.org/abstracts/search?q=transcription%20regulation" title=" transcription regulation"> transcription regulation</a> </p> <a href="https://publications.waset.org/abstracts/147333/ismara-completely-automated-inference-of-gene-regulatory-networks-from-high-throughput-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147333.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">65</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18</span> Evaluation of Rhus lancea and Celtis africana as Browse for Mixed-Feeders in Captivity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=France%20Phiri">France Phiri</a>, <a href="https://publications.waset.org/abstracts/search?q=Arnold%20Kanengoni"> Arnold Kanengoni</a>, <a href="https://publications.waset.org/abstracts/search?q=Dawood%20Hattas"> Dawood Hattas</a>, <a href="https://publications.waset.org/abstracts/search?q=Khanyisile%20Mbatha"> Khanyisile Mbatha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A study was carried out to determine seasonal changes in fiber composition and condensed tannin (CT) concentrations in Rhus lancea and Celtis africana and their effects on feed intake and blood metabolites in mixed-feeders. Rhus lancea and C. africana were analysed for dry matter (DM), acid detergent lignin (ADL), acid detergent fiber (ADF), neutral detergent fiber (NDF) and CT concentrations over four seasons; early wet (EWS), late wet (LWS), early dry (EDS) and late dry (LDS). Twelve indigenous male goats were kept in metabolic crates for periods of 21 days per season and fed one of two diet combinations; the test diet comprised R. lancea and C. africana (denoted as BROWSE) and the lucerne diet comprised lucerne (Medicago sativa and concentrates (CON). Feed intake, body weight and blood metabolites were determined in all goats over each study period. Goats fed BROWSE in the EDS, LDS and LWS lost weight while goats fed CON gained weight (P < 0.05). Goats fed CON had higher urea, alkaline phosphatase and gamma-glutamyl transferase concentrations than those fed BROWSE (P < 0.05). Creatinine and cholesterol concentrations in all goats across LWS, EDS and LDS were lower than the normal range, while total protein and globulin concentrations were higher. The goats fed BROWSE had higher creatinine concentrations (P < 0.05) than those fed CON. Cholesterol concentrations were higher (P < 0.05) in goats fed BROWSE than in those on CON fed. It was concluded that goats fed BROWSE lost weight, indicating insufficient nutrients for maintenance requirements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fiber" title="fiber">fiber</a>, <a href="https://publications.waset.org/abstracts/search?q=maintenance" title=" maintenance"> maintenance</a>, <a href="https://publications.waset.org/abstracts/search?q=condense%20tannins" title=" condense tannins"> condense tannins</a>, <a href="https://publications.waset.org/abstracts/search?q=blood%20metabolites" title=" blood metabolites"> blood metabolites</a> </p> <a href="https://publications.waset.org/abstracts/122473/evaluation-of-rhus-lancea-and-celtis-africana-as-browse-for-mixed-feeders-in-captivity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/122473.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">193</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17</span> Steel Industry Waste as Recyclable Raw Material for the Development of Ferrous-Aluminum Alloys</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arnold%20S.%20Freitas%20Neto">Arnold S. Freitas Neto</a>, <a href="https://publications.waset.org/abstracts/search?q=Rodrigo%20E.%20Coelho"> Rodrigo E. Coelho</a>, <a href="https://publications.waset.org/abstracts/search?q=Erick%20S.%20Mendon%C3%A7a"> Erick S. Mendonça</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study aims to assess if high-purity iron powder in iron-aluminum alloys can be replaced by SAE 1020 steel chips with an atomicity proportion of 50% for each element. Chips of SAE 1020 are rejected in industrial processes. Thus, the use of SAE 1020 as a replaceable composite for iron increase the sustainability of ferrous alloys by recycling industrial waste. The alloys were processed by high energy milling, of which the main advantage is the minimal loss of raw material. The raw material for three of the six samples were high purity iron powder and recyclable aluminum cans. For the other three samples, the high purity iron powder has been replaced with chips of SAE 1020 steel. The process started with the separate milling of chips of aluminum and SAE 1020 steel to obtain the powder. Subsequently, the raw material was mixed in the pre-defined proportions, milled together for five hours and then underwent a closed-die hot compaction at the temperature of 500 °C. Thereafter, the compacted samples underwent heat treatments known as sintering and solubilization. All samples were sintered one hour, and 4 samples were solubilized for either 4 or 10 hours under well-controlled atmosphere conditions. Lastly, the composition and the mechanical properties of their hardness were analyzed. The samples were analyzed by optical microscopy, scanning electron microscopy and hardness testing. The results of the analysis showed a similar chemical composition and interesting hardness levels with low standard deviations. This verified that the use of SAE 1020 steel chips can be a low-cost alternative for high-purity iron powder and could possibly replace high-purity Iron in industrial applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fe-Al%20alloys" title="Fe-Al alloys">Fe-Al alloys</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20energy%20milling" title=" high energy milling"> high energy milling</a>, <a href="https://publications.waset.org/abstracts/search?q=iron-aluminum%20alloys" title=" iron-aluminum alloys"> iron-aluminum alloys</a>, <a href="https://publications.waset.org/abstracts/search?q=metallography%20characterization" title=" metallography characterization"> metallography characterization</a>, <a href="https://publications.waset.org/abstracts/search?q=powder%20metallurgy" title=" powder metallurgy"> powder metallurgy</a>, <a href="https://publications.waset.org/abstracts/search?q=recycling%20ferrous%20alloy" title=" recycling ferrous alloy"> recycling ferrous alloy</a>, <a href="https://publications.waset.org/abstracts/search?q=SAE%201020%20steel%20recycling" title=" SAE 1020 steel recycling"> SAE 1020 steel recycling</a> </p> <a href="https://publications.waset.org/abstracts/67384/steel-industry-waste-as-recyclable-raw-material-for-the-development-of-ferrous-aluminum-alloys" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67384.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">16</span> The Executive Functioning Profile of Children and Adolescents with a Diagnosis of OCD: A Systematic Review and Meta-Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Parker%20Townes">Parker Townes</a>, <a href="https://publications.waset.org/abstracts/search?q=Aisouda%20Savadlou"> Aisouda Savadlou</a>, <a href="https://publications.waset.org/abstracts/search?q=Shoshana%20Weiss"> Shoshana Weiss</a>, <a href="https://publications.waset.org/abstracts/search?q=Marina%20Jarenova"> Marina Jarenova</a>, <a href="https://publications.waset.org/abstracts/search?q=Suzzane%20Ferris"> Suzzane Ferris</a>, <a href="https://publications.waset.org/abstracts/search?q=Dan%20Devoe"> Dan Devoe</a>, <a href="https://publications.waset.org/abstracts/search?q=Russel%20Schachar"> Russel Schachar</a>, <a href="https://publications.waset.org/abstracts/search?q=Scott%20Patten"> Scott Patten</a>, <a href="https://publications.waset.org/abstracts/search?q=Tomas%20Lange"> Tomas Lange</a>, <a href="https://publications.waset.org/abstracts/search?q=Marlena%20Colasanto"> Marlena Colasanto</a>, <a href="https://publications.waset.org/abstracts/search?q=Holly%20McGinn"> Holly McGinn</a>, <a href="https://publications.waset.org/abstracts/search?q=Paul%20Arnold"> Paul Arnold</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Some research suggests obsessive-compulsive disorder (OCD) is associated with impaired executive functioning: higher-level mental processes involved in carrying out tasks and solving problems. Relevant literature was identified systematically through online databases. Meta-analyses were conducted for task performance metrics reported by at least two articles. Results were synthesized by the executive functioning domain measured through each performance metric. Heterogeneous literature was identified, typically involving few studies using consistent measures. From 29 included studies, analyses were conducted on 33 performance metrics from 12 tasks. Results suggest moderate associations of working memory (two out of five tasks presented significant findings), planning (one out of two tasks presented significant findings), and visuospatial abilities (one out of two tasks presented significant findings) with OCD in youth. There was inadequate literature or contradictory findings for other executive functioning domains. These findings suggest working memory, planning, and visuospatial abilities are impaired in pediatric OCD, with mixed results. More work is needed to identify the effect of age and sex on these results. Acknowledgment: This work was supported by the Alberta Innovates Translational Health Chair in Child and Youth Mental Health. The funders had no role in the design, conducting, writing, or decision to submit this article for publication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=obsessive-compulsive%20disorder" title="obsessive-compulsive disorder">obsessive-compulsive disorder</a>, <a href="https://publications.waset.org/abstracts/search?q=neurocognition" title=" neurocognition"> neurocognition</a>, <a href="https://publications.waset.org/abstracts/search?q=executive%20functioning" title=" executive functioning"> executive functioning</a>, <a href="https://publications.waset.org/abstracts/search?q=adolescents" title=" adolescents"> adolescents</a>, <a href="https://publications.waset.org/abstracts/search?q=children" title=" children"> children</a> </p> <a href="https://publications.waset.org/abstracts/156454/the-executive-functioning-profile-of-children-and-adolescents-with-a-diagnosis-of-ocd-a-systematic-review-and-meta-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156454.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">99</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15</span> Women Doing Leadership in Higher Education: Drawing on Individual Experiences to Analyse On-Going Gender Inequality in the Sector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sarah%20Barnard">Sarah Barnard</a>, <a href="https://publications.waset.org/abstracts/search?q=John%20Arnold"> John Arnold</a>, <a href="https://publications.waset.org/abstracts/search?q=Fehmidah%20Munir"> Fehmidah Munir</a>, <a href="https://publications.waset.org/abstracts/search?q=Sara%20Bosley"> Sara Bosley</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Gender issues in higher education continue to represent a complex issue as institutions grapple with the role that organisations can play in combatting inequality. Schemes like Athena SWAN and the Aurora leadership programme in the UK context are attempting to tackle some of the issues around representation and the recognition of women in the sector. This paper is the first of its kind in reporting findings from a mixed-methods longitudinal study on both professional services and academic women in higher education in the UK. Online surveys have been completed by over 2,000 women in the sector. The qualitative elements include interviews with women and their mentors, and diaries with a select group of women. So far results have shown that contrary to the stereotype of women lacking leadership skills or having no desire to go into higher roles, women in the sector consistently assessed their leadership abilities positively, especially but not only regarding interpersonal interaction and facilitation. Over 80% of women agreed that they felt confident about putting themselves forward for positions of responsibility at work. However, qualitative data shows that confidence remains a salient term for how women talk about the challenges they have faced at work. This suggests that the work needed to challenge systemic gender issues requires action to be driven above the individual level. Overall, academics reported more negative experiences than professional services staff. Similarly BAME women’s responses are more negative. Therefore, the study offers some information on the differential experiences of women. In conclusion, women in higher education are undertaking considerable ‘below the radar’ leadership activities in what they perceive to be a somewhat inhospitable hostile workplace culture. The significant amount of effort expended in the sector is affecting slow, partial impacts on gender inequalities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gender" title="gender">gender</a>, <a href="https://publications.waset.org/abstracts/search?q=higher%20education" title=" higher education"> higher education</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership" title=" leadership"> leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=longitudinal%20research" title=" longitudinal research"> longitudinal research</a> </p> <a href="https://publications.waset.org/abstracts/77912/women-doing-leadership-in-higher-education-drawing-on-individual-experiences-to-analyse-on-going-gender-inequality-in-the-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/77912.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">244</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Arnold%20I.%20Malag&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Arnold%20I.%20Malag&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>