CINXE.COM
Search results for: Benjamin Legros
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: Benjamin Legros</title> <meta name="description" content="Search results for: Benjamin Legros"> <meta name="keywords" content="Benjamin Legros"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="Benjamin Legros" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="Benjamin Legros"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 155</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: Benjamin Legros</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">155</span> Management of Empty Containers by Consignees in the Hinterland</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Legros">Benjamin Legros</a>, <a href="https://publications.waset.org/abstracts/search?q=Jan%20Fransoo"> Jan Fransoo</a>, <a href="https://publications.waset.org/abstracts/search?q=Oualid%20Jouini"> Oualid Jouini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims to evaluate street-turn strategies for empty container repositioning in the hinterland. Containers arrive over time at the (importer) consignee, while the demand for containers arises from the (exporter) shipper. A match can be operated between an empty container from the consignee and the load from the shipper. Therefore, we model the system as a double-ended queue with non-zero matching time and a limited number of resources in order to optimize the reposition- ing decisions. We determine the performance measures when the consignee operates using a fixed withholding threshold policy. We show that the matching time mainly plays a role in the matching proportion, while under a certain duration, it only marginally impacts the consignee’s inventory policy and cost per container. Also, the withholding level is mainly determined by the shipper’s production rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=container" title="container">container</a>, <a href="https://publications.waset.org/abstracts/search?q=double-ended%20queue" title=" double-ended queue"> double-ended queue</a>, <a href="https://publications.waset.org/abstracts/search?q=inventory" title=" inventory"> inventory</a>, <a href="https://publications.waset.org/abstracts/search?q=Markov%20decision%20process" title=" Markov decision process"> Markov decision process</a>, <a href="https://publications.waset.org/abstracts/search?q=non-zero%20matching%20time" title=" non-zero matching time"> non-zero matching time</a>, <a href="https://publications.waset.org/abstracts/search?q=street-turn" title=" street-turn"> street-turn</a> </p> <a href="https://publications.waset.org/abstracts/159800/management-of-empty-containers-by-consignees-in-the-hinterland" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159800.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">142</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">154</span> Content Creation as Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=D.%20van%20der%20Merwe">D. van der Merwe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Walter Benjamin observed a marked difference in test performances versus final performances, with special regard to film and the cinema setting versus the stage as the site of performance, exhibition, and consumption. The attention given to film is justifiable and valid given its position as the best example of media convergence of Benjamin’s era, that of late modernity. In contemporary terms, however, the film has been supplanted by content as the prime example of convergence at work, and the digital domain, materialized in the form of the mobile internet, as the substituted site for the cinema. By examining the performance of the polymediated self within social media content, this paper hopes to establish the practice of content creation as a cultural artefact evidencing exhibition value on par with -or at least comparable with- performance art. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=content%20creation" title="content creation">content creation</a>, <a href="https://publications.waset.org/abstracts/search?q=convergence" title=" convergence"> convergence</a>, <a href="https://publications.waset.org/abstracts/search?q=stage%20performance" title=" stage performance"> stage performance</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20performance" title=" test performance"> test performance</a>, <a href="https://publications.waset.org/abstracts/search?q=polymediation" title=" polymediation"> polymediation</a>, <a href="https://publications.waset.org/abstracts/search?q=Walter%20Benjamin" title=" Walter Benjamin"> Walter Benjamin</a> </p> <a href="https://publications.waset.org/abstracts/193880/content-creation-as-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193880.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">10</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">153</span> Interface Designer as Cultural Producer: A Dialectic Materialist Approach to the Role of Visual Designer in the Present Digital Era</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cagri%20Baris%20Kasap">Cagri Baris Kasap</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, how interface designers can be viewed as producers of culture in the current era will be interrogated from a critical theory perspective. Walter Benjamin was a German Jewish literary critical theorist who, during 1930s, was engaged in opposing and criticizing the Nazi use of art and media. ‘The Author as Producer’ is an essay that Benjamin has read at the Communist Institute for the Study of Fascism in Paris. In this article, Benjamin relates directly to the dialectics between base and superstructure and argues that authors, normally placed within the superstructure should consider how writing and publishing is production and directly related to the base. Through it, he discusses what it could mean to see author as producer of his own text, as a producer of writing, understood as an ideological construct that rests on the apparatus of production and distribution. So Benjamin concludes that the author must write in ways that relate to the conditions of production, he must do so in order to prepare his readers to become writers and even make this possible for them by engineering an ‘improved apparatus’ and must work toward turning consumers to producers and collaborators. In today’s world, it has become a leading business model within Web 2.0 services of multinational Internet technologies and culture industries like Amazon, Apple and Google, to transform readers, spectators, consumers or users into collaborators and co-producers through platforms such as Facebook, YouTube and Amazon’s CreateSpace Kindle Direct Publishing print-on-demand, e-book and publishing platforms. However, the way this transformation happens is tightly controlled and monitored by combinations of software and hardware. In these global-market monopolies, it has become increasingly difficult to get insight into how one’s writing and collaboration is used, captured, and capitalized as a user of Facebook or Google. In the lens of this study, it could be argued that this criticism could very well be considered by digital producers or even by the mass of collaborators in contemporary social networking software. How do software and design incorporate users and their collaboration? Are they truly empowered, are they put in a position where they are able to understand the apparatus and how their collaboration is part of it? Or has the apparatus become a means against the producers? Thus, when using corporate systems like Google and Facebook, iPhone and Kindle without any control over the means of production, which is closed off by opaque interfaces and licenses that limit our rights of use and ownership, we are already the collaborators that Benjamin calls for. For example, the iPhone and the Kindle combine a specific use of technology to distribute the relations between the ‘authors’ and the ‘prodUsers’ in ways that secure their monopolistic business models by limiting the potential of the technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=interface%20designer" title="interface designer">interface designer</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural%20producer" title=" cultural producer"> cultural producer</a>, <a href="https://publications.waset.org/abstracts/search?q=Walter%20Benjamin" title=" Walter Benjamin"> Walter Benjamin</a>, <a href="https://publications.waset.org/abstracts/search?q=materialist%20aesthetics" title=" materialist aesthetics"> materialist aesthetics</a>, <a href="https://publications.waset.org/abstracts/search?q=dialectical%20thinking" title=" dialectical thinking"> dialectical thinking</a> </p> <a href="https://publications.waset.org/abstracts/108231/interface-designer-as-cultural-producer-a-dialectic-materialist-approach-to-the-role-of-visual-designer-in-the-present-digital-era" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108231.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">142</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">152</span> Carl Schmitt in the Age of Immanence: A Critical Reading</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manuel%20Iretzberger">Manuel Iretzberger</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper aims to uncover the ideological aspects in the political thought of Carl Schmitt, who is enjoying an ever-increasing popularity in various academic fields, following in the wake of rising interest in questions of sovereignty and legitimacy. Given Schmitt’s biography, i.e. his role as the ‘Crown Jurist of the Third Reich’ (Gurian), an extraordinarily thorough examination is necessary; however, instead of merely ‘deconstructing’ his works, certain ontological truths he might have attained, shall be taken seriously. To this end, his notions of politics and the state of exception are scrutinized, which are indeed considered intriguing, yet prove to be enigmatic and impalpable at the core when read closely. In order to explain this conjuncture, both Schmitt’s philosophy of history and his ‘secret discussion’ (Agamben) with Walter Benjamin are depicted. As it turns out – it is argued – his concept of the Political has to be conceived of as embedded in a much broader context: In a post-transcendental, immanent age, he regards traditional modes of representation as no longer feasible and clings to authoritarianism as a surrogate – his Catholicism plays a decisive role here, forcing him to inject normatively biased assumptions into his political writings. Seeing Schmitt perform ‘rearguard action’ not only serves to disarm his work of most of its menacing aura, it also allows drawing conclusions about ways of legitimatizing democratic rule in modern times, as the paper tries to outline in its last section. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benjamin" title="Benjamin">Benjamin</a>, <a href="https://publications.waset.org/abstracts/search?q=history" title=" history"> history</a>, <a href="https://publications.waset.org/abstracts/search?q=immanence" title=" immanence"> immanence</a>, <a href="https://publications.waset.org/abstracts/search?q=Schmitt" title=" Schmitt"> Schmitt</a>, <a href="https://publications.waset.org/abstracts/search?q=sovereignty" title=" sovereignty"> sovereignty</a> </p> <a href="https://publications.waset.org/abstracts/45934/carl-schmitt-in-the-age-of-immanence-a-critical-reading" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45934.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">294</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">151</span> Battery Grading Algorithm in 2nd-Life Repurposing LI-Ion Battery System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ya%20L.%20V.">Ya L. V.</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Ong%20Wei%20Lin"> Benjamin Ong Wei Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Wanli%20Niu"> Wanli Niu</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Seah%20Chin%20Tat"> Benjamin Seah Chin Tat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article introduces a methodology that improves reliability and cyclability of 2nd-life Li-ion battery system repurposed as an energy storage system (ESS). Most of the 2nd-life retired battery systems in the market have module/pack-level state-of-health (SOH) indicator, which is utilized for guiding appropriate depth-of-discharge (DOD) in the application of ESS. Due to the lack of cell-level SOH indication, the different degrading behaviors among various cells cannot be identified upon reaching retired status; in the end, considering end-of-life (EOL) loss and pack-level DOD, the repurposed ESS has to be oversized by > 1.5 times to complement the application requirement of reliability and cyclability. This proposed battery grading algorithm, using non-invasive methodology, is able to detect outlier cells based on historical voltage data and calculate cell-level historical maximum temperature data using semi-analytic methodology. In this way, the individual battery cell in the 2nd-life battery system can be graded in terms of SOH on basis of the historical voltage fluctuation and estimated historical maximum temperature variation. These grades will have corresponding DOD grades in the application of the repurposed ESS to enhance system reliability and cyclability. In all, this introduced battery grading algorithm is non-invasive, compatible with all kinds of retired Li-ion battery systems which lack of cell-level SOH indication, as well as potentially being embedded into battery management software for preventive maintenance and real-time cyclability optimization. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=battery%20grading%20algorithm" title="battery grading algorithm">battery grading algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=2nd-life%20repurposing%20battery%20system" title=" 2nd-life repurposing battery system"> 2nd-life repurposing battery system</a>, <a href="https://publications.waset.org/abstracts/search?q=semi-analytic%20methodology" title=" semi-analytic methodology"> semi-analytic methodology</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability%20and%20cyclability" title=" reliability and cyclability"> reliability and cyclability</a> </p> <a href="https://publications.waset.org/abstracts/136464/battery-grading-algorithm-in-2nd-life-repurposing-li-ion-battery-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136464.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">150</span> Attitudes Towards the Supernatural in Benjamin Britten’s The Turn of the Screw</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yaou%20Zhang">Yaou Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Relatively little scholarly attention has been paid to the production of Benjamin Britten’s chamber opera The Turn of the Screw. As one of Britten’s most remarkable operas. The story of the libretto was from Henry James’s novella of the same name. The novella was created in 1898 and one of the primary questions addressed to people in the story is “how real the ghosts are,” which leads the story to a huge ambiguity in readers’ minds. Aims: This research focuses on the experience of seeing the opera on stage over several decades. This study of opera productions over time not only provides insight into how stage performances can alter audience members' perceptions of the opera in the present but also reveals a landscape of shifting aesthetics and receptions. Methods: To examine the hypotheses in interpretation and reception, the qualitative analysis is used to examine the figures of ghosts in different productions across the time from 1954 to 2021 in the UK: by accessing recordings, newspapers, and reviews for the productions that are sourced from online and physical archives. For instance, the field research is conducted on the topic by arranging interviews with the creative team and visiting Opera North in Leeds and Britten-Pears Foundation. The collected data reveals the “hidden identity” in creative teams’ interpretations, social preferences, and rediscover that have previously remained unseen. Results: This research presents an angle of Britten’s Screw by using the third position; it shows how the attention moved from the stage of “do the ghosts really exist” to “traumatised children.” Discussion: Critics and audiences have debated whether the governess hallucinates the ghosts in the opera for decades. While, in recent years, directors of new productions have given themselves the opportunity to go deeper into Britten's musical structure and offer the opera more space to be interpreted, rather than debating if "ghosts actually exist" or "the psychological problems of the governess." One can consider and reflect that the questionable actions of the children are because they are suffering from trauma, whether the trauma comes from the ghosts, the hallucinating governess, or some prior experiences: various interpretations cause one result that children are the recipients of trauma. Arguably, the role of the supernatural is neither simply one of the elements of a ghost story nor simply one of the parts of the ambiguity between the supernatural and the hallucination of the governess; rather, the ghosts and the hallucinating governess can exist at the same time - the combination of the supernatural’s and the governess’s behaviours on stage generates a sharper and more serious angle that draws our attention to the traumatized children. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=benjamin%20britten" title="benjamin britten">benjamin britten</a>, <a href="https://publications.waset.org/abstracts/search?q=chamber%20opera" title=" chamber opera"> chamber opera</a>, <a href="https://publications.waset.org/abstracts/search?q=production" title=" production"> production</a>, <a href="https://publications.waset.org/abstracts/search?q=reception" title=" reception"> reception</a>, <a href="https://publications.waset.org/abstracts/search?q=staging" title=" staging"> staging</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20turn%20of%20the%20screw" title=" the turn of the screw"> the turn of the screw</a> </p> <a href="https://publications.waset.org/abstracts/149570/attitudes-towards-the-supernatural-in-benjamin-brittens-the-turn-of-the-screw" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149570.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">149</span> Constellating Images: Bilderatlases as a Tool to Develop Criticality towards Visual Culture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Quirijn%20Menken">Quirijn Menken</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Menken, Q. Author Constellating Images Abstract—We live in a predominantly visual era. Vastly expanded quantities of imagery influence us on a daily basis, in contrast to earlier days where the textual prevailed. The increasing producing and reproducing of images continuously compete for our attention. As such, how we perceive images and in what way images are framed or mediate our beliefs, has become of even greater importance than ever before. Especially in art education a critical awareness and approach of images as part of visual culture is of utmost importance. The Bilderatlas operates as a mediation, and offers new Ways of Seeing and knowing. It is mainly known as result of the ground-breaking work of the cultural theorist Aby Warburg, who intended to present an art history without words. His Mnemosyne Bilderatlas shows how the arrangement of images - and the interstices between them, offers new perspectives and ways of seeing. The Atlas as a medium to critically address Visual Culture is also practiced by the German artist Gerhard Richter, and it is in written form used in the Passagen Werk of Walter Benjamin. In order to examine the use of the Bilderatlas as a tool in art education, several experiments with art students have been conducted. These experiments have lead to an exploration of different Pedagogies, which help to offer new perspectives and trajectories of learning. To use the Bilderatlas as a tool to develop criticality towards Visual Culture, I developed and tested a new pedagogy; a Pedagogy of Difference and Repetition, based on the philosophy of Gilles Deleuze. Furthermore, in offering a new pedagogy - based on the rhizomatic work of Gilles Deleuze – the Bilderatlas as a tool to develop criticality has found a firm basis. Keywords—Art Education, Walter Benjamin, Bilderatlas, Gilles Deleuze, Difference and Repetition, Pedagogy, Rhizomes, Visual Culture, <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Art%20Education" title="Art Education">Art Education</a>, <a href="https://publications.waset.org/abstracts/search?q=Bilderatlas" title=" Bilderatlas"> Bilderatlas</a>, <a href="https://publications.waset.org/abstracts/search?q=Pedagogy" title=" Pedagogy"> Pedagogy</a>, <a href="https://publications.waset.org/abstracts/search?q=Aby%20Warburg" title=" Aby Warburg"> Aby Warburg</a> </p> <a href="https://publications.waset.org/abstracts/120920/constellating-images-bilderatlases-as-a-tool-to-develop-criticality-towards-visual-culture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/120920.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">154</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">148</span> Primes as Sums and Differences of Two Binomial Coefficients and Two Powersums</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Lee%20Warren">Benjamin Lee Warren</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Many problems exist in additive number theory which is essential to determine the primes that are the sum of two elements from a given single-variable polynomial sequence, and most of them are unattackable in the present day. Here, we determine solutions for this problem to a few certain sequences (certain binomial coefficients and power sums) using only elementary algebra and some algebraic factoring methods (as well as Euclid’s Lemma and Faulhaber’s Formula). In particular, we show that there are finitely many primes as sums of two of these types of elements. Several cases are fully illustrated, and bounds are presented for the cases not fully illustrated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=binomial%20coefficients" title="binomial coefficients">binomial coefficients</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20sums" title=" power sums"> power sums</a>, <a href="https://publications.waset.org/abstracts/search?q=primes" title=" primes"> primes</a>, <a href="https://publications.waset.org/abstracts/search?q=algebra" title=" algebra"> algebra</a> </p> <a href="https://publications.waset.org/abstracts/160042/primes-as-sums-and-differences-of-two-binomial-coefficients-and-two-powersums" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160042.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">104</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">147</span> Optics Meets Microfluidics for Highly Sensitive Force Sensing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iliya%20Dimitrov%20Stoev">Iliya Dimitrov Stoev</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Seelbinder"> Benjamin Seelbinder</a>, <a href="https://publications.waset.org/abstracts/search?q=Elena%20Erben"> Elena Erben</a>, <a href="https://publications.waset.org/abstracts/search?q=Nicola%20Maghelli"> Nicola Maghelli</a>, <a href="https://publications.waset.org/abstracts/search?q=Moritz%20Kreysing"> Moritz Kreysing</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Despite the revolutionizing impact of optical tweezers in materials science and cell biology up to the present date, trapping has so far extensively relied on specific material properties of the probe and local heating has limited applications related to investigating dynamic processes within living systems. To overcome these limitations while maintaining high sensitivity, here we present a new optofluidic approach that can be used to gently trap microscopic particles and measure femtoNewton forces in a contact-free manner and with thermally limited precision. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=optofluidics" title="optofluidics">optofluidics</a>, <a href="https://publications.waset.org/abstracts/search?q=force%20measurements" title=" force measurements"> force measurements</a>, <a href="https://publications.waset.org/abstracts/search?q=microrheology" title=" microrheology"> microrheology</a>, <a href="https://publications.waset.org/abstracts/search?q=FLUCS" title=" FLUCS"> FLUCS</a>, <a href="https://publications.waset.org/abstracts/search?q=thermoviscous%20flows" title=" thermoviscous flows"> thermoviscous flows</a> </p> <a href="https://publications.waset.org/abstracts/147676/optics-meets-microfluidics-for-highly-sensitive-force-sensing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147676.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">146</span> Mechanical Characterization of Banana by Inverse Analysis Method Combined with Indentation Test</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Juan%20F.%20P.%20Ram%C3%ADrez">Juan F. P. Ramírez</a>, <a href="https://publications.waset.org/abstracts/search?q=J%C3%A9sica%20A.%20L.%20Isaza"> Jésica A. L. Isaza</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjam%C3%ADn%20A.%20Rojano"> Benjamín A. Rojano</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study proposes a novel use of a method to determine the mechanical properties of fruits by the use of the indentation tests. The method combines experimental results with a numerical finite elements model. The results presented correspond to a simplified numerical modeling of banana. The banana was assumed as one-layer material with an isotropic linear elastic mechanical behavior, the Young’s modulus found is 0.3Mpa. The method will be extended to multilayer models in further studies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=finite%20element%20method" title="finite element method">finite element method</a>, <a href="https://publications.waset.org/abstracts/search?q=fruits" title=" fruits"> fruits</a>, <a href="https://publications.waset.org/abstracts/search?q=inverse%20analysis" title=" inverse analysis"> inverse analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=mechanical%20properties" title=" mechanical properties"> mechanical properties</a> </p> <a href="https://publications.waset.org/abstracts/5459/mechanical-characterization-of-banana-by-inverse-analysis-method-combined-with-indentation-test" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5459.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">145</span> Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ejd%20Garba">Ejd Garba</a>, <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin"> Okike Benjamin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arithmetic" title="arithmetic">arithmetic</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20space" title=" cyber space"> cyber space</a>, <a href="https://publications.waset.org/abstracts/search?q=modulo-2" title=" modulo-2"> modulo-2</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security "> information security </a> </p> <a href="https://publications.waset.org/abstracts/30281/application-of-modulo-2-arithmetic-in-securing-communicated-messages-throughout-the-globe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30281.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">320</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">144</span> Media Effects in Metamodernity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=D.%20van%20der%20Merwe">D. van der Merwe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Despite unprecedented changes in the media formats, typologies, delivery channels, and content that can be seen between Walter Benjamin’s writings from the era of modernity and those observable in the contemporary era of metamodernity, parallels can be drawn between the media effects experienced by audiences across the temporal divide. This paper will explore alignments between these two eras as evidenced by various media effects. First, convergence in the historical paradigm of film will be compared with the same effect as seen within the digital domain. Second, the uses and gratifications theory will be explored to delineate parallels in terms of user behaviours across both eras, regardless of medium. Third, cultivation theory and its role in manipulation via the media in both modernity and metamodernity will be discussed. Lastly, similarities between the archetypal personae populating each era will be unpacked. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=convergence" title="convergence">convergence</a>, <a href="https://publications.waset.org/abstracts/search?q=cultivation%20theory" title=" cultivation theory"> cultivation theory</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20effects" title=" media effects"> media effects</a>, <a href="https://publications.waset.org/abstracts/search?q=metamodernity" title=" metamodernity"> metamodernity</a>, <a href="https://publications.waset.org/abstracts/search?q=uses%20and%20gratifications%20theory" title=" uses and gratifications theory"> uses and gratifications theory</a> </p> <a href="https://publications.waset.org/abstracts/193879/media-effects-in-metamodernity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193879.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">11</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">143</span> Comparative Studies of Modified Clay/Polyaniline Nanocomposites</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fatima%20Zohra%20Zeggai">Fatima Zohra Zeggai</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Carbonnier"> Benjamin Carbonnier</a>, <a href="https://publications.waset.org/abstracts/search?q=A%C3%AFcha%20Hachemaoui"> Aïcha Hachemaoui</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Yahiaoui"> Ahmed Yahiaoui</a>, <a href="https://publications.waset.org/abstracts/search?q=Samia%20Mahouche-Chergui"> Samia Mahouche-Chergui</a>, <a href="https://publications.waset.org/abstracts/search?q=Zakaria%20Salmi"> Zakaria Salmi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A series of polyaniline (PANI)/modified Montmorillonite (MMT) Clay nanocomposite materials have been successfully prepared by In-Situ polymerization in the presence of modified MMT-Clay or Diazonium-MMT-Clay. The obtained nanocomposites were characterized and compared by various physicochemical techniques. The presence of physicochemical interaction, probably hydrogen bonding, between clay and polyaniline, which was confirmed by FTIR, UV-Vis Spectroscopy. The electrical conductivity of neat PANI and a series of the obtained nanocomposites were also studied by cyclic voltammograms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=polyaniline" title="polyaniline">polyaniline</a>, <a href="https://publications.waset.org/abstracts/search?q=clay" title=" clay"> clay</a>, <a href="https://publications.waset.org/abstracts/search?q=nanocomposites" title=" nanocomposites"> nanocomposites</a>, <a href="https://publications.waset.org/abstracts/search?q=in-situ%20polymerization" title=" in-situ polymerization"> in-situ polymerization</a>, <a href="https://publications.waset.org/abstracts/search?q=polymers%20conductors" title=" polymers conductors"> polymers conductors</a>, <a href="https://publications.waset.org/abstracts/search?q=diazonium%20salt" title=" diazonium salt"> diazonium salt</a> </p> <a href="https://publications.waset.org/abstracts/17853/comparative-studies-of-modified-claypolyaniline-nanocomposites" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17853.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">472</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">142</span> A Correlational Study: Dark Triad and Self-Restraint among Criminology Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mary%20Heather%20Lee%20T.%20Walker">Mary Heather Lee T. Walker</a>, <a href="https://publications.waset.org/abstracts/search?q=Audilon%20Benjamin%20Madamba"> Audilon Benjamin Madamba</a>, <a href="https://publications.waset.org/abstracts/search?q=Mizheal%20Vstrechnny%20Vidal"> Mizheal Vstrechnny Vidal</a>, <a href="https://publications.waset.org/abstracts/search?q=Rogelio%20Angeles"> Rogelio Angeles</a>, <a href="https://publications.waset.org/abstracts/search?q=John%20Rhey%20Banag"> John Rhey Banag</a>, <a href="https://publications.waset.org/abstracts/search?q=Lorraine%20Martin"> Lorraine Martin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Criminology students are the future police officers of the country that plays a major role in protecting the citizens. Their behavior must be thoroughly assessed before given a badge of responsibility. Therefore, it is important to highlight their Dark Triad that is composed of Machiavellianism, Narcissism, and Psychopathy which are considered to be controversial variables in the present while self-restraint is considered to be their way of controlling themselves especially in their line of work. The researchers used convenience and random sampling and found the respondents from a private school. Thus, the study’s aim is to determine whether there is a relationship among these variables. Machiavellianism and Psychopathy is linked to Self-Restraint except Narcissism. There are lots of factors that resulted into this. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminology" title="criminology">criminology</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20triad" title=" dark triad"> dark triad</a>, <a href="https://publications.waset.org/abstracts/search?q=self-restraint" title=" self-restraint"> self-restraint</a>, <a href="https://publications.waset.org/abstracts/search?q=students" title=" students"> students</a> </p> <a href="https://publications.waset.org/abstracts/104229/a-correlational-study-dark-triad-and-self-restraint-among-criminology-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104229.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">141</span> Closest Possible Neighbor of a Different Class: Explaining a Model Using a Neighbor Migrating Generator</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hassan%20Eshkiki">Hassan Eshkiki</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Mora"> Benjamin Mora</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Neighbor Migrating Generator is a simple and efficient approach to finding the closest potential neighbor(s) with a different label for a given instance and so without the need to calibrate any kernel settings at all. This allows determining and explaining the most important features that will influence an AI model. It can be used to either migrate a specific sample to the class decision boundary of the original model within a close neighborhood of that sample or identify global features that can help localising neighbor classes. The proposed technique works by minimizing a loss function that is divided into two components which are independently weighted according to three parameters α, β, and ω, α being self-adjusting. Results show that this approach is superior to past techniques when detecting the smallest changes in the feature space and may also point out issues in models like over-fitting. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=explainable%20AI" title="explainable AI">explainable AI</a>, <a href="https://publications.waset.org/abstracts/search?q=EX%20AI" title=" EX AI"> EX AI</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20importance" title=" feature importance"> feature importance</a>, <a href="https://publications.waset.org/abstracts/search?q=counterfactual%20explanations" title=" counterfactual explanations"> counterfactual explanations</a> </p> <a href="https://publications.waset.org/abstracts/156369/closest-possible-neighbor-of-a-different-class-explaining-a-model-using-a-neighbor-migrating-generator" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156369.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">192</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">140</span> Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Earleen%20Jane%20Fuentes">Earleen Jane Fuentes</a>, <a href="https://publications.waset.org/abstracts/search?q=Regeene%20Melarese%20Lim"> Regeene Melarese Lim</a>, <a href="https://publications.waset.org/abstracts/search?q=Franklin%20Benjamin%20Tapia"> Franklin Benjamin Tapia</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexis%20Pantola"> Alexis Pantola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=acknowledgment-based%20techniques" title="acknowledgment-based techniques">acknowledgment-based techniques</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20ad-hoc%20network" title=" mobile ad-hoc network"> mobile ad-hoc network</a>, <a href="https://publications.waset.org/abstracts/search?q=selfish%20nodes" title=" selfish nodes"> selfish nodes</a>, <a href="https://publications.waset.org/abstracts/search?q=reputation-based%20techniques" title=" reputation-based techniques"> reputation-based techniques</a> </p> <a href="https://publications.waset.org/abstracts/49862/misleading-node-detection-and-response-mechanism-in-mobile-ad-hoc-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49862.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">385</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">139</span> Poetry as Valuable Tool for Tackling Climate Change and Environmental Pollution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Anabaraonye">Benjamin Anabaraonye</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Our environment is our entitlement, and it is our duty to guard it for the safety of our society. It is, therefore, in our best interest to explore the necessary tools required to tackle the issues of environmental pollution which are major causes of climate change. Poetry has been discovered through our study as a valuable tool for tackling climate change and environmental pollution. This study explores the science of poetry and how important it is for scientists and engineers to develop their creativity to obtain relevant skills needed to tackle these global challenges. Poetry has been discovered as a great tool for climate change education which in turn brings about climate change adaptation and mitigation. This paper is, therefore, a clarion and urgent call for us to rise to our responsibility for a sustainable future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=climate%20change" title="climate change">climate change</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=environment" title=" environment"> environment</a>, <a href="https://publications.waset.org/abstracts/search?q=poetry" title=" poetry"> poetry</a> </p> <a href="https://publications.waset.org/abstracts/86909/poetry-as-valuable-tool-for-tackling-climate-change-and-environmental-pollution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86909.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">206</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">138</span> Evaluating 8D Reports Using Text-Mining</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Kuester">Benjamin Kuester</a>, <a href="https://publications.waset.org/abstracts/search?q=Bjoern%20Eilert"> Bjoern Eilert</a>, <a href="https://publications.waset.org/abstracts/search?q=Malte%20Stonis"> Malte Stonis</a>, <a href="https://publications.waset.org/abstracts/search?q=Ludger%20Overmeyer"> Ludger Overmeyer </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Increasing quality requirements make reliable and effective quality management indispensable. This includes the complaint handling in which the 8D method is widely used. The 8D report as a written documentation of the 8D method is one of the key quality documents as it internally secures the quality standards and acts as a communication medium to the customer. In practice, however, the 8D report is mostly faulty and of poor quality. There is no quality control of 8D reports today. This paper describes the use of natural language processing for the automated evaluation of 8D reports. Based on semantic analysis and text-mining algorithms the presented system is able to uncover content and formal quality deficiencies and thus increases the quality of the complaint processing in the long term. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=8D%20report" title="8D report">8D report</a>, <a href="https://publications.waset.org/abstracts/search?q=complaint%20management" title=" complaint management"> complaint management</a>, <a href="https://publications.waset.org/abstracts/search?q=evaluation%20system" title=" evaluation system"> evaluation system</a>, <a href="https://publications.waset.org/abstracts/search?q=text-mining" title=" text-mining"> text-mining</a> </p> <a href="https://publications.waset.org/abstracts/75439/evaluating-8d-reports-using-text-mining" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/75439.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">315</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">137</span> Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin">Okike Benjamin</a>, <a href="https://publications.waset.org/abstracts/search?q=Garba%20E.%20J.%20D."> Garba E. J. D.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=merged%20irregular%20transposition" title="merged irregular transposition">merged irregular transposition</a>, <a href="https://publications.waset.org/abstracts/search?q=error%20level" title=" error level"> error level</a>, <a href="https://publications.waset.org/abstracts/search?q=model%20estimation" title=" model estimation"> model estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20splitting" title=" message splitting"> message splitting</a> </p> <a href="https://publications.waset.org/abstracts/22331/model-estimation-and-error-level-for-okikes-merged-irregular-transposition-cipher" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22331.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">136</span> Development of Enhanced Data Encryption Standard</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Okike">Benjamin Okike</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=encryption" title="encryption">encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=enhanced%20data%20encryption" title=" enhanced data encryption"> enhanced data encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption%20techniques" title=" encryption techniques"> encryption techniques</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a> </p> <a href="https://publications.waset.org/abstracts/131071/development-of-enhanced-data-encryption-standard" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131071.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">150</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">135</span> A Security Study for Smart Metering Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Musaab%20Hasan">Musaab Hasan</a>, <a href="https://publications.waset.org/abstracts/search?q=Farkhund%20Iqbal"> Farkhund Iqbal</a>, <a href="https://publications.waset.org/abstracts/search?q=Patrick%20C.%20K.%20Hung"> Patrick C. K. Hung</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20C.%20M.%20Fung"> Benjamin C. M. Fung</a>, <a href="https://publications.waset.org/abstracts/search?q=Laura%20Rafferty"> Laura Rafferty</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security%20design" title="security design">security design</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20city" title=" smart city"> smart city</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20meter" title=" smart meter"> smart meter</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20grid" title=" smart grid"> smart grid</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20metering%20system" title=" smart metering system"> smart metering system</a> </p> <a href="https://publications.waset.org/abstracts/79129/a-security-study-for-smart-metering-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79129.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">336</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">134</span> Reliability of Eyewitness Statements in Fire and Explosion Investigations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jeff%20Colwell">Jeff Colwell</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Knox"> Benjamin Knox</a> </p> <p class="card-text"><strong>Abstract:</strong></p> While fire and explosion incidents are often observed by eyewitnesses, the weight that fire investigators should place on those observations in their investigations is a complex issue. There is no doubt that eyewitness statements can be an important component to an investigation, particularly when other evidence is sparse, as is often the case when damage to the scene is severe. However, it is well known that eyewitness statements can be incorrect for a variety of reasons, including deception. In this paper, we reviewed factors that can have an effect on the complex processes associated with the perception, retention, and retrieval of an event. We then review the accuracy of eyewitness statements from unique criminal and civil incidents, including fire and explosion incidents, in which the accuracy of the statements could be independently evaluated. Finally, the motives for deceptive eyewitness statements are described, along with techniques that fire and explosion investigators can employ, to increase the accuracy of the eyewitness statements that they solicit. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fire" title="fire">fire</a>, <a href="https://publications.waset.org/abstracts/search?q=explosion" title=" explosion"> explosion</a>, <a href="https://publications.waset.org/abstracts/search?q=eyewitness" title=" eyewitness"> eyewitness</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a> </p> <a href="https://publications.waset.org/abstracts/143632/reliability-of-eyewitness-statements-in-fire-and-explosion-investigations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143632.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">382</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">133</span> Community Based Participatory Research in Opioid Use: Design of an Informatics Solution </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sue%20S.%20Feldman">Sue S. Feldman</a>, <a href="https://publications.waset.org/abstracts/search?q=Bradley%20Tipper"> Bradley Tipper</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Schooley"> Benjamin Schooley</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nearly every community in the US has been impacted by opioid related addictions/deaths; it is a national problem that is threatening our social and economic welfare. Most believe that tackling this problem from a prevention perspective advances can be made toward breaking the chain of addiction. One mechanism, community based participatory research, involves the community in the prevention approach. This project combines that approach with a design science approach to develop an integrated solution. Findings suggested accountable care communities, transpersonal psychology, and social exchange theory as product kernel theories. Evaluation was conducted on a prototype. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=substance%20use%20and%20abuse%20recovery" title="substance use and abuse recovery">substance use and abuse recovery</a>, <a href="https://publications.waset.org/abstracts/search?q=community%20resource%20centers" title=" community resource centers"> community resource centers</a>, <a href="https://publications.waset.org/abstracts/search?q=accountable%20care%20communities" title=" accountable care communities"> accountable care communities</a>, <a href="https://publications.waset.org/abstracts/search?q=community%20based%20participatory%20research" title=" community based participatory research"> community based participatory research</a> </p> <a href="https://publications.waset.org/abstracts/120274/community-based-participatory-research-in-opioid-use-design-of-an-informatics-solution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/120274.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">132</span> Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin">Okike Benjamin</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20J.%20D.%20Garba"> E. J. D. Garba </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security" title="information security">information security</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20splitting" title=" message splitting"> message splitting</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern" title=" pattern"> pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=sequence" title=" sequence "> sequence </a> </p> <a href="https://publications.waset.org/abstracts/22633/pattern-in-splitting-sequence-in-okikes-merged-irregular-transposition-cipher-for-encrypting-cyberspace-messages" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22633.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">289</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">131</span> Predicting the Uniaxial Strength Distribution of Brittle Materials Based on a Uniaxial Test</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Sonnenreich">Benjamin Sonnenreich</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Brittle fracture failure probability is best described using a stochastic approach which is based on the 'weakest link concept' and the connection between a microstructure and macroscopic fracture scale. A general theoretical and experimental framework is presented to predict the uniaxial strength distribution according to independent uniaxial test data. The framework takes as input the applied stresses, the geometry, the materials, the defect distributions and the relevant random variables from uniaxial test results and gives as output an overall failure probability that can be used to improve the reliability of practical designs. Additionally, the method facilitates comparisons of strength data from several sources, uniaxial tests, and sample geometries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=brittle%20fracture" title="brittle fracture">brittle fracture</a>, <a href="https://publications.waset.org/abstracts/search?q=strength%20distribution" title=" strength distribution"> strength distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=uniaxial" title=" uniaxial"> uniaxial</a>, <a href="https://publications.waset.org/abstracts/search?q=weakest%20link%20concept" title=" weakest link concept"> weakest link concept</a> </p> <a href="https://publications.waset.org/abstracts/4969/predicting-the-uniaxial-strength-distribution-of-brittle-materials-based-on-a-uniaxial-test" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4969.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">325</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">130</span> Determination of Complexity Level in Merged Irregular Transposition Cipher</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin">Okike Benjamin</a>, <a href="https://publications.waset.org/abstracts/search?q=Garba%20Ejd"> Garba Ejd</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=transposition%20cipher" title="transposition cipher">transposition cipher</a>, <a href="https://publications.waset.org/abstracts/search?q=merged%20irregular%20cipher" title=" merged irregular cipher"> merged irregular cipher</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=complexity%20level" title=" complexity level "> complexity level </a> </p> <a href="https://publications.waset.org/abstracts/13713/determination-of-complexity-level-in-merged-irregular-transposition-cipher" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13713.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">129</span> Deployment of Matrix Transpose in Digital Image Encryption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin">Okike Benjamin</a>, <a href="https://publications.waset.org/abstracts/search?q=Garba%20E%20J.%20D."> Garba E J. D.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Encryption is used to conceal information from prying eyes. Presently, information and data encryption are common due to the volume of data and information in transit across the globe on daily basis. Image encryption is yet to receive the attention of the researchers as deserved. In other words, video and multimedia documents are exposed to unauthorized accessors. The authors propose image encryption using matrix transpose. An algorithm that would allow image encryption is developed. In this proposed image encryption technique, the image to be encrypted is split into parts based on the image size. Each part is encrypted separately using matrix transpose. The actual encryption is on the picture elements (pixel) that make up the image. After encrypting each part of the image, the positions of the encrypted images are swapped before transmission of the image can take place. Swapping the positions of the images is carried out to make the encrypted image more robust for any cryptanalyst to decrypt. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=image%20encryption" title="image encryption">image encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=matrices" title=" matrices"> matrices</a>, <a href="https://publications.waset.org/abstracts/search?q=pixel" title=" pixel"> pixel</a>, <a href="https://publications.waset.org/abstracts/search?q=matrix%20transpose" title=" matrix transpose "> matrix transpose </a> </p> <a href="https://publications.waset.org/abstracts/48717/deployment-of-matrix-transpose-in-digital-image-encryption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48717.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">421</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">128</span> Assessment of Barriers to the Clinical Adoption of Cell-Based Therapeutics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=David%20Pettitt">David Pettitt</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Davies"> Benjamin Davies</a>, <a href="https://publications.waset.org/abstracts/search?q=Georg%20Holl%C3%A4nder"> Georg Holländer</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20Brindley"> David Brindley</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cellular based therapies, whose origins can be traced from the intertwined concepts of tissue engineering and regenerative medicine, have the potential to transform the current medical landscape and offer an approach to managing what were once considered untreatable diseases. However, despite a large increase in basic science activity in the cell therapy arena alongside a growing portfolio of cell therapy trials, the number of industry products available for widespread clinical use correlates poorly with such a magnitude of activity, with the number of cell-based therapeutics in mainstream use remaining comparatively low. This research serves to quantitatively assess the barriers to the clinical adoption of cell-based therapeutics through identification of unique barriers, specific challenges and opportunities facing the development and adoption of such therapies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cell%20therapy" title="cell therapy">cell therapy</a>, <a href="https://publications.waset.org/abstracts/search?q=clinical%20adoption" title=" clinical adoption"> clinical adoption</a>, <a href="https://publications.waset.org/abstracts/search?q=commercialization" title=" commercialization"> commercialization</a>, <a href="https://publications.waset.org/abstracts/search?q=translation" title=" translation"> translation</a> </p> <a href="https://publications.waset.org/abstracts/43347/assessment-of-barriers-to-the-clinical-adoption-of-cell-based-therapeutics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43347.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">400</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">127</span> The Keys to Innovation: Defining and Evaluating Attributes that Measure Innovation Capabilities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Samarah">Mohammad Samarah</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Stark"> Benjamin Stark</a>, <a href="https://publications.waset.org/abstracts/search?q=Jennifer%20Kindle"> Jennifer Kindle</a>, <a href="https://publications.waset.org/abstracts/search?q=Langley%20Payton"> Langley Payton</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Innovation is a key driver for companies, society, and economic growth. However, assessing and measuring innovation for individuals as well as organizations remains difficult. Our i5-Score presented in this study will help to overcome this difficulty and facilitate measuring the innovation potential. The score is based on a framework we call the 5Gs of innovation which defines specific innovation attributes. Those are 1) the drive for long-term goals 2) the audacity to generate new ideas, 3) the openness to share ideas with others, 4) the ability to grow, and 5) the ability to maintain high levels of optimism. To validate the i5-Score, we conducted a study at Florida Polytechnic University. The results show that the i5-Score is a good measure reflecting the innovative mindset of an individual or a group. Thus, the score can be utilized for evaluating, refining and enhancing innovation capabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Change%20Management" title="Change Management">Change Management</a>, <a href="https://publications.waset.org/abstracts/search?q=Innovation%20Attributes" title=" Innovation Attributes"> Innovation Attributes</a>, <a href="https://publications.waset.org/abstracts/search?q=Organizational%20Development" title=" Organizational Development"> Organizational Development</a>, <a href="https://publications.waset.org/abstracts/search?q=STEM%20and%20Venture%20Creation" title=" STEM and Venture Creation"> STEM and Venture Creation</a> </p> <a href="https://publications.waset.org/abstracts/100675/the-keys-to-innovation-defining-and-evaluating-attributes-that-measure-innovation-capabilities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/100675.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">169</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">126</span> Evaluation of Sensor Pattern Noise Estimators for Source Camera Identification </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Anderson-Sackaney">Benjamin Anderson-Sackaney</a>, <a href="https://publications.waset.org/abstracts/search?q=Amr%20Abdel-Dayem"> Amr Abdel-Dayem</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a comprehensive survey of recent source camera identification (SCI) systems. Then, the performance of various sensor pattern noise (SPN) estimators was experimentally assessed, under common photo response non-uniformity (PRNU) frameworks. The experiments used 1350 natural and 900 flat-field images, captured by 18 individual cameras. 12 different experiments, grouped into three sets, were conducted. The results were analyzed using the receiver operator characteristic (ROC) curves. The experimental results demonstrated that combining the basic SPN estimator with a wavelet-based filtering scheme provides promising results. However, the phase SPN estimator fits better with both patch-based (BM3D) and anisotropic diffusion (AD) filtering schemes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sensor%20pattern%20noise" title="sensor pattern noise">sensor pattern noise</a>, <a href="https://publications.waset.org/abstracts/search?q=source%20camera%20identification" title=" source camera identification"> source camera identification</a>, <a href="https://publications.waset.org/abstracts/search?q=photo%20response%20non-uniformity" title=" photo response non-uniformity"> photo response non-uniformity</a>, <a href="https://publications.waset.org/abstracts/search?q=anisotropic%20diffusion" title=" anisotropic diffusion"> anisotropic diffusion</a>, <a href="https://publications.waset.org/abstracts/search?q=peak%20to%20correlation%20energy%20ratio" title=" peak to correlation energy ratio"> peak to correlation energy ratio</a> </p> <a href="https://publications.waset.org/abstracts/63183/evaluation-of-sensor-pattern-noise-estimators-for-source-camera-identification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63183.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">441</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Benjamin%20Legros&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Benjamin%20Legros&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Benjamin%20Legros&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Benjamin%20Legros&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Benjamin%20Legros&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Benjamin%20Legros&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>