CINXE.COM
Search results for: blocking artifacts
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: blocking artifacts</title> <meta name="description" content="Search results for: blocking artifacts"> <meta name="keywords" content="blocking artifacts"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="blocking artifacts" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="blocking artifacts"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 367</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: blocking artifacts</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">367</span> Different Views and Evaluations of IT Artifacts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sameh%20Al-Natour">Sameh Al-Natour</a>, <a href="https://publications.waset.org/abstracts/search?q=Izak%20Benbasat"> Izak Benbasat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The introduction of a multitude of new and interactive e-commerce information technology (IT) artifacts has impacted adoption research. Rather than solely functioning as productivity tools, new IT artifacts assume the roles of interaction mediators and social actors. This paper describes the varying roles assumed by IT artifacts, and proposes and distinguishes between four distinct foci of how the artifacts are evaluated. It further proposes a theoretical model that maps the different views of IT artifacts to four distinct types of evaluations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IT%20adoption" title="IT adoption">IT adoption</a>, <a href="https://publications.waset.org/abstracts/search?q=IT%20artifacts" title=" IT artifacts"> IT artifacts</a>, <a href="https://publications.waset.org/abstracts/search?q=similarity" title=" similarity"> similarity</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20actor" title=" social actor"> social actor</a> </p> <a href="https://publications.waset.org/abstracts/9516/different-views-and-evaluations-of-it-artifacts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9516.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">391</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">366</span> Grid Pattern Recognition and Suppression in Computed Radiographic Images</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Igor%20Belykh">Igor Belykh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Anti-scatter grids used in radiographic imaging for the contrast enhancement leave specific artifacts. Those artifacts may be visible or may cause Moiré effect when a digital image is resized on a diagnostic monitor. In this paper, we propose an automated grid artifacts detection and suppression algorithm which is still an actual problem. Grid artifacts detection is based on statistical approach in spatial domain. Grid artifacts suppression is based on Kaiser bandstop filter transfer function design and application avoiding ringing artifacts. Experimental results are discussed and concluded with description of advantages over existing approaches. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=grid" title="grid">grid</a>, <a href="https://publications.waset.org/abstracts/search?q=computed%20radiography" title=" computed radiography"> computed radiography</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern%20recognition" title=" pattern recognition"> pattern recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20processing" title=" image processing"> image processing</a>, <a href="https://publications.waset.org/abstracts/search?q=filtering" title=" filtering"> filtering</a> </p> <a href="https://publications.waset.org/abstracts/7833/grid-pattern-recognition-and-suppression-in-computed-radiographic-images" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7833.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">365</span> Heterogeneous Artifacts Construction for Software Evolution Control</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mounir%20Zekkaoui">Mounir Zekkaoui</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdelhadi%20Fennan"> Abdelhadi Fennan </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The software evolution control requires a deep understanding of the changes and their impact on different system heterogeneous artifacts. And an understanding of descriptive knowledge of the developed software artifacts is a prerequisite condition for the success of the evolutionary process. The implementation of an evolutionary process is to make changes more or less important to many heterogeneous software artifacts such as source code, analysis and design models, unit testing, XML deployment descriptors, user guides, and others. These changes can be a source of degradation in functional, qualitative or behavioral terms of modified software. Hence the need for a unified approach for extraction and representation of different heterogeneous artifacts in order to ensure a unified and detailed description of heterogeneous software artifacts, exploitable by several software tools and allowing to responsible for the evolution of carry out the reasoning change concerned. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=heterogeneous%20software%20artifacts" title="heterogeneous software artifacts">heterogeneous software artifacts</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20evolution%20control" title=" software evolution control"> software evolution control</a>, <a href="https://publications.waset.org/abstracts/search?q=unified%20approach" title=" unified approach"> unified approach</a>, <a href="https://publications.waset.org/abstracts/search?q=meta%20model" title=" meta model"> meta model</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20architecture" title=" software architecture"> software architecture</a> </p> <a href="https://publications.waset.org/abstracts/13647/heterogeneous-artifacts-construction-for-software-evolution-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13647.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">445</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">364</span> Protection of Website Owners' Rights: Proportionality of Website Blocking in Russia and Beyond</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ekaterina%20Semenova">Ekaterina Semenova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The article explores the issue of website owners’ liability for the illicit content. Whilst various issues of secondary liability of internet access providers for the illicit content have been widely discussed in the law doctrine, the liability of website owners has attracted less attention. Meanwhile, the website blocking injunctions influence website owners’ rights most, since website owners have the interest to keep their website online, rather than internet access providers. The discussion of internet access providers’ liability overshadows the necessity to protect the website owners’ rights to due process and proportionality of blocking injunctions. The analysis of Russian website blocking regulation and case law showed that the protection of website owners’ rights depends on the kind of illicit content: some content induces automatic blocking injunctions without prior notice of website owners and any opportunity to appeal, while other content does not invoke automatic blocking and provides an opportunity for the website owner to avoid or appeal an injunction. Comparative analysis of website blocking regulations in European countries reveals different approaches to the proportionality of website blocking and website owner’s rights protection. Based on the findings of the study, we conclude that the global trend to impose website blocking injunctions on wide range of illicit content without due process of law interferes with the rights of website owners. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=illicit%20content" title="illicit content">illicit content</a>, <a href="https://publications.waset.org/abstracts/search?q=liability" title=" liability"> liability</a>, <a href="https://publications.waset.org/abstracts/search?q=Russia" title=" Russia"> Russia</a>, <a href="https://publications.waset.org/abstracts/search?q=website%20blocking" title=" website blocking"> website blocking</a> </p> <a href="https://publications.waset.org/abstracts/71411/protection-of-website-owners-rights-proportionality-of-website-blocking-in-russia-and-beyond" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71411.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">352</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">363</span> Forensic Analysis of Signal Messenger on Android</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ward%20Bakker">Ward Bakker</a>, <a href="https://publications.waset.org/abstracts/search?q=Shadi%20Alhakimi"> Shadi Alhakimi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The amount of people moving towards more privacy focused instant messaging applications has grown significantly. Signal is one of these instant messaging applications, which makes Signal interesting for digital investigators. In this research, we evaluate the artifacts that are generated by the Signal messenger for Android. This evaluation was done by using the features that Signal provides to create artifacts, whereafter, we made an image of the internal storage and the process memory. This image was analysed manually. The manual analysis revealed the content that Signal stores in different locations during its operation. From our research, we were able to identify the artifacts and interpret how they were used. We also examined the source code of Signal. Using our obtain knowledge from the source code, we developed a tool that decrypts some of the artifacts using the key stored in the Android Keystore. In general, we found that most artifacts are encrypted and encoded, even after decrypting some of the artifacts. During data visualization, some artifacts were found, such as that Signal does not use relationships between the data. In this research, two interesting groups of artifacts were identified, those related to the database and those stored in the process memory dump. In the database, we found plaintext private- and group chats, and in the memory dump, we were able to retrieve the plaintext access code to the application. Nevertheless, we conclude that Signal contains a wealth of artifacts that could be very valuable to a digital forensic investigation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensic" title="forensic">forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=signal" title=" signal"> signal</a>, <a href="https://publications.waset.org/abstracts/search?q=Android" title=" Android"> Android</a>, <a href="https://publications.waset.org/abstracts/search?q=digital" title=" digital"> digital</a> </p> <a href="https://publications.waset.org/abstracts/145060/forensic-analysis-of-signal-messenger-on-android" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145060.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">362</span> Notice and Block?</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Althaf%20Marsoof">Althaf Marsoof</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The blocking injunction, giving rise to a ‘notice and block’ regime, has become the new approach to curtail the infringement of Intellectual Property rights on the Internet. As such, the blocking injunction is an addition to the arsenal of copyright owners, and more recently has also benefited trademark owners, in their battle against piracy and counterfeiting. Yet, the blocking injunction, notwithstanding the usefulness of its ‘notice and block’ outcome, is not without limitations. In the circumstances, it is argued that ‘notice and takedown’, the approach that has been adopted by right-holders for some years, is still an important remedy against the proliferation of online content that infringe the rights of copyright and trademark owners, which is both viable and effective. Thus, it is suggested that the battle against online piracy and counterfeiting could be won only if both the blocking injunction and the practice of ‘notice and takedown’ are utilised by right-holders as complementary and simultaneous remedies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blocking%20injunctions" title="blocking injunctions">blocking injunctions</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20intermediaries" title=" internet intermediaries"> internet intermediaries</a>, <a href="https://publications.waset.org/abstracts/search?q=notice%20and%20takedown" title=" notice and takedown"> notice and takedown</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20property" title=" intellectual property"> intellectual property</a> </p> <a href="https://publications.waset.org/abstracts/23729/notice-and-block" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23729.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">416</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">361</span> Effect of Chemistry Museum Artifacts on Students’ Memory Enhancement and Interest in Radioactivity in Calabar Education Zone, Cross River State, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hope%20Amba%20Neji">Hope Amba Neji</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study adopted a quasi-experimental design. Two schools were used for the experimental study, while one school was used for the control. The experimental groups were subjected to treatment for four weeks with chemistry museum artifacts and a visit as made to the museum so that learners would have real-life learning experiences with museum resources, while the control group was taught with the conventional method. The instrument for the study was a 20-item Chemistry Memory Test (CMT) and a 10-item Chemistry Interest Questionnaire (CIQ). The reliability was ascertained using (KR-20) and alpha reliability coefficient, which yielded a reliability coefficient of .83 and .81, respectively. Data obtained was analyzed using Analysis of Covariance (ANCOVA) and Analysis of variance (ANOVA) at 0.05 level of significance. Findings revealed that museum artifacts have a significant effect on students’ memory enhancement and interest in chemistry. It was recommended chemistry learning should be enhanced, motivating and real with museum artifacts, which significantly aid memory enhancement and interest in chemistry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=museum%20artifacts" title="museum artifacts">museum artifacts</a>, <a href="https://publications.waset.org/abstracts/search?q=memory" title=" memory"> memory</a>, <a href="https://publications.waset.org/abstracts/search?q=chemistry" title=" chemistry"> chemistry</a>, <a href="https://publications.waset.org/abstracts/search?q=atitude" title=" atitude"> atitude</a> </p> <a href="https://publications.waset.org/abstracts/177785/effect-of-chemistry-museum-artifacts-on-students-memory-enhancement-and-interest-in-radioactivity-in-calabar-education-zone-cross-river-state-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177785.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">360</span> Algorithm for Automatic Real-Time Electrooculographic Artifact Correction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Norman%20Sinnigen">Norman Sinnigen</a>, <a href="https://publications.waset.org/abstracts/search?q=Igor%20Izyurov"> Igor Izyurov</a>, <a href="https://publications.waset.org/abstracts/search?q=Marina%20Krylova"> Marina Krylova</a>, <a href="https://publications.waset.org/abstracts/search?q=Hamidreza%20Jamalabadi"> Hamidreza Jamalabadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Sarah%20Alizadeh"> Sarah Alizadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Martin%20Walter"> Martin Walter</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: EEG is a non-invasive brain activity recording technique with a high temporal resolution that allows the use of real-time applications, such as neurofeedback. However, EEG data are susceptible to electrooculographic (EOG) and electromyography (EMG) artifacts (i.e., jaw clenching, teeth squeezing and forehead movements). Due to their non-stationary nature, these artifacts greatly obscure the information and power spectrum of EEG signals. Many EEG artifact correction methods are too time-consuming when applied to low-density EEG and have been focusing on offline processing or handling one single type of EEG artifact. A software-only real-time method for correcting multiple types of EEG artifacts of high-density EEG remains a significant challenge. Methods: We demonstrate an improved approach for automatic real-time EEG artifact correction of EOG and EMG artifacts. The method was tested on three healthy subjects using 64 EEG channels (Brain Products GmbH) and a sampling rate of 1,000 Hz. Captured EEG signals were imported in MATLAB with the lab streaming layer interface allowing buffering of EEG data. EMG artifacts were detected by channel variance and adaptive thresholding and corrected by using channel interpolation. Real-time independent component analysis (ICA) was applied for correcting EOG artifacts. Results: Our results demonstrate that the algorithm effectively reduces EMG artifacts, such as jaw clenching, teeth squeezing and forehead movements, and EOG artifacts (horizontal and vertical eye movements) of high-density EEG while preserving brain neuronal activity information. The average computation time of EOG and EMG artifact correction for 80 s (80,000 data points) 64-channel data is 300 – 700 ms depending on the convergence of ICA and the type and intensity of the artifact. Conclusion: An automatic EEG artifact correction algorithm based on channel variance, adaptive thresholding, and ICA improves high-density EEG recordings contaminated with EOG and EMG artifacts in real-time. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=EEG" title="EEG">EEG</a>, <a href="https://publications.waset.org/abstracts/search?q=muscle%20artifacts" title=" muscle artifacts"> muscle artifacts</a>, <a href="https://publications.waset.org/abstracts/search?q=ocular%20artifacts" title=" ocular artifacts"> ocular artifacts</a>, <a href="https://publications.waset.org/abstracts/search?q=real-time%20artifact%20correction" title=" real-time artifact correction"> real-time artifact correction</a>, <a href="https://publications.waset.org/abstracts/search?q=real-time%20ICA" title=" real-time ICA"> real-time ICA</a> </p> <a href="https://publications.waset.org/abstracts/102844/algorithm-for-automatic-real-time-electrooculographic-artifact-correction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102844.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">180</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">359</span> Dimensioning of Circuit Switched Networks by Using Simulation Code Based On Erlang (B) Formula</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Mustafa%20Elshawesh">Ali Mustafa Elshawesh</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Abdulali"> Mohamed Abdulali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper presents an approach to dimension circuit switched networks and find the relationship between the parameters of the circuit switched networks on the condition of specific probability of call blocking. Our work is creating a Simulation code based on Erlang (B) formula to draw graphs which show two curves for each graph; one of simulation and the other of calculated. These curves represent the relationships between average number of calls and average call duration with the probability of call blocking. This simulation code facilitates to select the appropriate parameters for circuit switched networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Erlang%20B%20formula" title="Erlang B formula">Erlang B formula</a>, <a href="https://publications.waset.org/abstracts/search?q=call%20blocking" title=" call blocking"> call blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=telephone%20system%20dimension" title=" telephone system dimension"> telephone system dimension</a>, <a href="https://publications.waset.org/abstracts/search?q=Markov%20model" title=" Markov model"> Markov model</a>, <a href="https://publications.waset.org/abstracts/search?q=link%20capacity" title=" link capacity"> link capacity</a> </p> <a href="https://publications.waset.org/abstracts/6283/dimensioning-of-circuit-switched-networks-by-using-simulation-code-based-on-erlang-b-formula" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6283.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">612</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">358</span> Impact Analysis Based on Change Requirement Traceability in Object Oriented Software Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sunil%20Tumkur%20Dakshinamurthy">Sunil Tumkur Dakshinamurthy</a>, <a href="https://publications.waset.org/abstracts/search?q=Mamootil%20Zachariah%20Kurian"> Mamootil Zachariah Kurian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Change requirement traceability in object oriented software systems is one of the challenging areas in research. We know that the traces between links of different artifacts are to be automated or semi-automated in the software development life cycle (SDLC). The aim of this paper is discussing and implementing aspects of dynamically linking the artifacts such as requirements, high level design, code and test cases through the Extensible Markup Language (XML) or by dynamically generating Object Oriented (OO) metrics. Also, non-functional requirements (NFR) aspects such as stability, completeness, clarity, validity, feasibility and precision are discussed. We discuss this as a Fifth Taxonomy, which is a system vulnerability concern. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artifacts" title="artifacts">artifacts</a>, <a href="https://publications.waset.org/abstracts/search?q=NFRs" title=" NFRs"> NFRs</a>, <a href="https://publications.waset.org/abstracts/search?q=OO%20metrics" title=" OO metrics"> OO metrics</a>, <a href="https://publications.waset.org/abstracts/search?q=SDLC" title=" SDLC"> SDLC</a>, <a href="https://publications.waset.org/abstracts/search?q=XML" title=" XML"> XML</a> </p> <a href="https://publications.waset.org/abstracts/58275/impact-analysis-based-on-change-requirement-traceability-in-object-oriented-software-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58275.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">342</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">357</span> The Comparative Study of Binary Artifact Repository Managers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Evgeny%20Chugunnyy">Evgeny Chugunnyy</a>, <a href="https://publications.waset.org/abstracts/search?q=Alena%20Gerasimova"> Alena Gerasimova</a>, <a href="https://publications.waset.org/abstracts/search?q=Kirill%20Chernyavskiy"> Kirill Chernyavskiy</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexander%20Krasnov"> Alexander Krasnov</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the primary component of Continuous deployment (CD) is a binary artifact repository — the place where artifacts are stored with metadata in a structured way. The binary artifact repository manager (BARM) is a software, which implements this repository logic and exposes a public application programming interface (API) for managing these artifacts. Almost every programming language ecosystem has its own artifact repository kind. During creating Artipie — BARM constructor and server, we analyzed and implemented a lot of different artifact repositories. In this paper we present criterias for comparing artifact repositories, and analyze the most popular repositories using these metrics. We also describe some of the notable features of different repositories. This paper aimed to help people who are creating, maintaining or optimizing software repository and CI tools. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artifact" title="artifact">artifact</a>, <a href="https://publications.waset.org/abstracts/search?q=repository" title=" repository"> repository</a>, <a href="https://publications.waset.org/abstracts/search?q=continuous%20deployment" title=" continuous deployment"> continuous deployment</a>, <a href="https://publications.waset.org/abstracts/search?q=build%20automation" title=" build automation"> build automation</a>, <a href="https://publications.waset.org/abstracts/search?q=artifacts%20management" title=" artifacts management"> artifacts management</a> </p> <a href="https://publications.waset.org/abstracts/155047/the-comparative-study-of-binary-artifact-repository-managers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155047.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">150</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">356</span> Hand-Held X-Ray Fluorescence Spectroscopy for Pre-Diagnostic Studies in Conservation, and Limitations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Irmak%20Gunes%20Yuceil">Irmak Gunes Yuceil</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper outlines interferences and analytical errors which are encountered in the qualification and quantification of archaeological and ethnographic artifacts, by means of handheld x-ray fluorescence. These shortcomings were evaluated through case studies carried out on metallic artifacts related to various periods and cultures around Anatolia. An Innov-X Delta Standard 2000 handheld x-ray fluorescence spectrometer was used to collect data from 1361 artifacts, through 6789 measurements and 70 hours’ tube usage, in between 2013-2017. Spectrum processing was done by Delta Advanced PC Software. Qualitative and quantitative results screened by the device were compared with the spectrum graphs, and major discrepancies associated with physical and analytical interferences were clarified in this paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hand-held%20x-ray%20fluorescence%20spectroscopy" title="hand-held x-ray fluorescence spectroscopy">hand-held x-ray fluorescence spectroscopy</a>, <a href="https://publications.waset.org/abstracts/search?q=art%20and%20archaeology" title=" art and archaeology"> art and archaeology</a>, <a href="https://publications.waset.org/abstracts/search?q=interferences%20and%20analytical%20errors" title=" interferences and analytical errors"> interferences and analytical errors</a>, <a href="https://publications.waset.org/abstracts/search?q=pre-diagnosis%20in%20conservation" title=" pre-diagnosis in conservation"> pre-diagnosis in conservation</a> </p> <a href="https://publications.waset.org/abstracts/96185/hand-held-x-ray-fluorescence-spectroscopy-for-pre-diagnostic-studies-in-conservation-and-limitations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96185.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">195</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">355</span> Network Conditioning and Transfer Learning for Peripheral Nerve Segmentation in Ultrasound Images</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Harold%20Mauricio%20D%C3%ADaz-Vargas">Harold Mauricio Díaz-Vargas</a>, <a href="https://publications.waset.org/abstracts/search?q=Cristian%20Alfonso%20Jimenez-Casta%C3%B1o"> Cristian Alfonso Jimenez-Castaño</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20Augusto%20C%C3%A1rdenas-Pe%C3%B1a"> David Augusto Cárdenas-Peña</a>, <a href="https://publications.waset.org/abstracts/search?q=Guillermo%20Alberto%20Ortiz-G%C3%B3mez"> Guillermo Alberto Ortiz-Gómez</a>, <a href="https://publications.waset.org/abstracts/search?q=Alvaro%20Angel%20Orozco-Gutierrez"> Alvaro Angel Orozco-Gutierrez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Precise identification of the nerves is a crucial task performed by anesthesiologists for an effective Peripheral Nerve Blocking (PNB). Now, anesthesiologists use ultrasound imaging equipment to guide the PNB and detect nervous structures. However, visual identification of the nerves from ultrasound images is difficult, even for trained specialists, due to artifacts and low contrast. The recent advances in deep learning make neural networks a potential tool for accurate nerve segmentation systems, so addressing the above issues from raw data. The most widely spread U-Net network yields pixel-by-pixel segmentation by encoding the input image and decoding the attained feature vector into a semantic image. This work proposes a conditioning approach and encoder pre-training to enhance the nerve segmentation of traditional U-Nets. Conditioning is achieved by the one-hot encoding of the kind of target nerve a the network input, while the pre-training considers five well-known deep networks for image classification. The proposed approach is tested in a collection of 619 US images, where the best C-UNet architecture yields an 81% Dice coefficient, outperforming the 74% of the best traditional U-Net. Results prove that pre-trained models with the conditional approach outperform their equivalent baseline by supporting learning new features and enriching the discriminant capability of the tested networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nerve%20segmentation" title="nerve segmentation">nerve segmentation</a>, <a href="https://publications.waset.org/abstracts/search?q=U-Net" title=" U-Net"> U-Net</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=ultrasound%20imaging" title=" ultrasound imaging"> ultrasound imaging</a>, <a href="https://publications.waset.org/abstracts/search?q=peripheral%20nerve%20blocking" title=" peripheral nerve blocking"> peripheral nerve blocking</a> </p> <a href="https://publications.waset.org/abstracts/152338/network-conditioning-and-transfer-learning-for-peripheral-nerve-segmentation-in-ultrasound-images" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152338.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">354</span> Study on Varying Solar Blocking Depths in the Exploration of Energy-Saving Renovation of the Energy-Saving Design of the External Shell of Existing Buildings: Using Townhouse Residences in Kaohsiung City as an Example</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kuang%20Sheng%20Liu">Kuang Sheng Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu%20Lin%20Shih%2A"> Yu Lin Shih*</a>, <a href="https://publications.waset.org/abstracts/search?q=Chun%20Ta%20Tzeng"> Chun Ta Tzeng</a>, <a href="https://publications.waset.org/abstracts/search?q=Cheng%20Chen%20Chen">Cheng Chen Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Buildings in the 21st century are facing issues such as an extreme climate and low-carbon/energy-saving requirements. Many countries in the world are of the opinion that a building during its medium- and long-term life cycle is an energy-consuming entity. As for the use of architectural resources, including the United Nations-implemented "Global Green Policy" and "Sustainable building and construction initiative", all are working towards "zero-energy building" and "zero-carbon building" policies. Because of this, countries are cooperating with industry development using policies such as "mandatory design criteria", "green procurement policy" and "incentive grants and rebates programme". The results of this study can provide a reference for sustainable building renovation design criteria. Aimed at townhouses in Kaohsiung City, this study uses different levels of solar blocking depth to carry out evaluation of design and energy-saving renovation of the outer shell of existing buildings by using data collection and the selection of representative cases. Using building resources from a building information model (BIM), simulation and efficiency evaluation are carried out and proven with simulation estimation. This leads into the ECO-efficiency model (EEM) for the life cycle cost efficiency (LCCE) evalution. The buildings selected by this research sit in a north-south direction set with different solar blocking depths. The indoor air-conditioning consumption rates are compared. The current balcony depth of 1 metre as the simulated EUI value acts as a reference value of 100%. The solar blocking of the balcony is increased to 1.5, 2, 2.5 and 3 metres for a total of 5 different solar-blocking balcony depths, for comparison of the air-conditioning improvement efficacy. This research uses different solar-blocking balcony depths to carry out air-conditioning efficiency analysis. 1.5m saves 3.08%, 2m saves 6.74%, 2.5m saves 9.80% and 3m saves 12.72% from the air-conditioning EUI value. This shows that solar-blocking balconies have an efficiency-increasing potential for indoor air-conditioning. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=building%20information%20model" title="building information model">building information model</a>, <a href="https://publications.waset.org/abstracts/search?q=eco-efficiency%20model" title=" eco-efficiency model"> eco-efficiency model</a>, <a href="https://publications.waset.org/abstracts/search?q=energy-saving%20in%20the%20external%20shell" title=" energy-saving in the external shell"> energy-saving in the external shell</a>, <a href="https://publications.waset.org/abstracts/search?q=solar%20blocking%20depth." title=" solar blocking depth. "> solar blocking depth. </a> </p> <a href="https://publications.waset.org/abstracts/7835/study-on-varying-solar-blocking-depths-in-the-exploration-of-energy-saving-renovation-of-the-energy-saving-design-of-the-external-shell-of-existing-buildings-using-townhouse-residences-in-kaohsiung-city-as-an-example" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7835.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">401</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">353</span> Robust Heart Rate Estimation from Multiple Cardiovascular and Non-Cardiovascular Physiological Signals Using Signal Quality Indices and Kalman Filter</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shalini%20Rankawat">Shalini Rankawat</a>, <a href="https://publications.waset.org/abstracts/search?q=Mansi%20Rankawat"> Mansi Rankawat</a>, <a href="https://publications.waset.org/abstracts/search?q=Rahul%20Dubey"> Rahul Dubey</a>, <a href="https://publications.waset.org/abstracts/search?q=Mazad%20Zaveri"> Mazad Zaveri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Physiological signals such as electrocardiogram (ECG) and arterial blood pressure (ABP) in the intensive care unit (ICU) are often seriously corrupted by noise, artifacts, and missing data, which lead to errors in the estimation of heart rate (HR) and incidences of false alarm from ICU monitors. Clinical support in ICU requires most reliable heart rate estimation. Cardiac activity, because of its relatively high electrical energy, may introduce artifacts in Electroencephalogram (EEG), Electrooculogram (EOG), and Electromyogram (EMG) recordings. This paper presents a robust heart rate estimation method by detection of R-peaks of ECG artifacts in EEG, EMG & EOG signals, using energy-based function and a novel Signal Quality Index (SQI) assessment technique. SQIs of physiological signals (EEG, EMG, & EOG) were obtained by correlation of nonlinear energy operator (teager energy) of these signals with either ECG or ABP signal. HR is estimated from ECG, ABP, EEG, EMG, and EOG signals from separate Kalman filter based upon individual SQIs. Data fusion of each HR estimate was then performed by weighing each estimate by the Kalman filters’ SQI modified innovations. The fused signal HR estimate is more accurate and robust than any of the individual HR estimate. This method was evaluated on MIMIC II data base of PhysioNet from bedside monitors of ICU patients. The method provides an accurate HR estimate even in the presence of noise and artifacts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ECG" title="ECG">ECG</a>, <a href="https://publications.waset.org/abstracts/search?q=ABP" title=" ABP"> ABP</a>, <a href="https://publications.waset.org/abstracts/search?q=EEG" title=" EEG"> EEG</a>, <a href="https://publications.waset.org/abstracts/search?q=EMG" title=" EMG"> EMG</a>, <a href="https://publications.waset.org/abstracts/search?q=EOG" title=" EOG"> EOG</a>, <a href="https://publications.waset.org/abstracts/search?q=ECG%20artifacts" title=" ECG artifacts"> ECG artifacts</a>, <a href="https://publications.waset.org/abstracts/search?q=Teager-Kaiser%20energy" title=" Teager-Kaiser energy"> Teager-Kaiser energy</a>, <a href="https://publications.waset.org/abstracts/search?q=heart%20rate" title=" heart rate"> heart rate</a>, <a href="https://publications.waset.org/abstracts/search?q=signal%20quality%20index" title=" signal quality index"> signal quality index</a>, <a href="https://publications.waset.org/abstracts/search?q=Kalman%20filter" title=" Kalman filter"> Kalman filter</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20fusion" title=" data fusion"> data fusion</a> </p> <a href="https://publications.waset.org/abstracts/17506/robust-heart-rate-estimation-from-multiple-cardiovascular-and-non-cardiovascular-physiological-signals-using-signal-quality-indices-and-kalman-filter" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17506.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">696</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">352</span> An Exploratory Study of Reliability of Ranking vs. Rating in Peer Assessment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yang%20Song">Yang Song</a>, <a href="https://publications.waset.org/abstracts/search?q=Yifan%20Guo"> Yifan Guo</a>, <a href="https://publications.waset.org/abstracts/search?q=Edward%20F.%20Gehringer"> Edward F. Gehringer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fifty years of research has found great potential for peer assessment as a pedagogical approach. With peer assessment, not only do students receive more copious assessments; they also learn to become assessors. In recent decades, more educational peer assessments have been facilitated by online systems. Those online systems are designed differently to suit different class settings and student groups, but they basically fall into two categories: rating-based and ranking-based. The rating-based systems ask assessors to rate the artifacts one by one following some review rubrics. The ranking-based systems allow assessors to review a set of artifacts and give a rank for each of them. Though there are different systems and a large number of users of each category, there is no comprehensive comparison on which design leads to higher reliability. In this paper, we designed algorithms to evaluate assessors' reliabilities based on their rating/ranking against the global ranks of the artifacts they have reviewed. These algorithms are suitable for data from both rating-based and ranking-based peer assessment systems. The experiments were done based on more than 15,000 peer assessments from multiple peer assessment systems. We found that the assessors in ranking-based peer assessments are at least 10% more reliable than the assessors in rating-based peer assessments. Further analysis also demonstrated that the assessors in ranking-based assessments tend to assess the more differentiable artifacts correctly, but there is no such pattern for rating-based assessors. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=peer%20assessment" title="peer assessment">peer assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=peer%20rating" title=" peer rating"> peer rating</a>, <a href="https://publications.waset.org/abstracts/search?q=peer%20ranking" title=" peer ranking"> peer ranking</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a> </p> <a href="https://publications.waset.org/abstracts/66206/an-exploratory-study-of-reliability-of-ranking-vs-rating-in-peer-assessment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66206.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">439</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">351</span> Low Complexity Deblocking Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jagroop%20Singh%20Sidhu">Jagroop Singh Sidhu</a>, <a href="https://publications.waset.org/abstracts/search?q=Buta%20Singh"> Buta Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A low computational deblocking filter including three frequency related modes (smooth mode, intermediate mode, and non-smooth mode for low-frequency, mid-frequency, and high frequency regions, respectively) is proposed. The suggested approach requires zero additions, zero subtractions, zero multiplications (for intermediate region), no divisions (for non-smooth region) and no comparison. The suggested method thus keeps the computation lower and thus suitable for image coding systems based on blocks. Comparison of average number of operations for smooth, non-smooth, intermediate (per pixel vector for each block) using filter suggested by Chen and the proposed method filter suggests that the proposed filter keeps the computation lower and is thus suitable for fast processing algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts" title="blocking artifacts">blocking artifacts</a>, <a href="https://publications.waset.org/abstracts/search?q=computational%20complexity" title=" computational complexity"> computational complexity</a>, <a href="https://publications.waset.org/abstracts/search?q=non-smooth" title=" non-smooth"> non-smooth</a>, <a href="https://publications.waset.org/abstracts/search?q=intermediate" title=" intermediate"> intermediate</a>, <a href="https://publications.waset.org/abstracts/search?q=smooth" title=" smooth"> smooth</a> </p> <a href="https://publications.waset.org/abstracts/47157/low-complexity-deblocking-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47157.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">462</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">350</span> Analysis of the Impact of Suez Canal on the Robustness of Global Shipping Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zimu%20Li">Zimu Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Zheng%20Wan"> Zheng Wan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Suez Canal plays an important role in global shipping networks and is one of the most frequently used waterways in the world. The 2021 canal obstruction by ship Ever Given in March 2021, however, completed blocked the Suez Canal for a week and caused significant disruption to world trade. Therefore, it is very important to quantitatively analyze the impact of the accident on the robustness of the global shipping network. However, the current research on maritime transportation networks is usually limited to local or small-scale networks in a certain region. Based on the complex network theory, this study establishes a global shipping complex network covering 2713 nodes and 137830 edges by using the real trajectory data of the global marine transport ship automatic identification system in 2018. At the same time, two attack modes, deliberate (Suez Canal Blocking) and random, are defined to calculate the changes in network node degree, eccentricity, clustering coefficient, network density, network isolated nodes, betweenness centrality, and closeness centrality under the two attack modes, and quantitatively analyze the actual impact of Suez Canal Blocking on the robustness of global shipping network. The results of the network robustness analysis show that Suez Canal blocking was more destructive to the shipping network than random attacks of the same scale. The network connectivity and accessibility decreased significantly, and the decline decreased with the distance between the port and the canal, showing the phenomenon of distance attenuation. This study further analyzes the impact of the blocking of the Suez Canal on Chinese ports and finds that the blocking of the Suez Canal significantly interferes withChina's shipping network and seriously affects China's normal trade activities. Finally, the impact of the global supply chain is analyzed, and it is found that blocking the canal will seriously damage the normal operation of the global supply chain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=global%20shipping%20networks" title="global shipping networks">global shipping networks</a>, <a href="https://publications.waset.org/abstracts/search?q=ship%20AIS%20trajectory%20data" title=" ship AIS trajectory data"> ship AIS trajectory data</a>, <a href="https://publications.waset.org/abstracts/search?q=main%20channel" title=" main channel"> main channel</a>, <a href="https://publications.waset.org/abstracts/search?q=complex%20network" title=" complex network"> complex network</a>, <a href="https://publications.waset.org/abstracts/search?q=eigenvalue%20change" title=" eigenvalue change"> eigenvalue change</a> </p> <a href="https://publications.waset.org/abstracts/143972/analysis-of-the-impact-of-suez-canal-on-the-robustness-of-global-shipping-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143972.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">182</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">349</span> Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Min%20Jin%20Kwon">Min Jin Kwon</a>, <a href="https://publications.waset.org/abstracts/search?q=Seung%20Won%20Kim"> Seung Won Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Eui%20Yeon%20Kim"> Eui Yeon Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Haeyoung%20Lee"> Haeyoung Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deep%20packet%20inspection" title="deep packet inspection">deep packet inspection</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20filtering" title=" internet filtering"> internet filtering</a>, <a href="https://publications.waset.org/abstracts/search?q=juvenile%20protection" title=" juvenile protection"> juvenile protection</a>, <a href="https://publications.waset.org/abstracts/search?q=technical%20blocking" title=" technical blocking"> technical blocking</a> </p> <a href="https://publications.waset.org/abstracts/66686/blocking-of-random-chat-apps-at-home-routers-for-juvenile-protection-in-south-korea" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66686.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">348</span> Incorporating Priority Round-Robin Scheduler to Sustain Indefinite Blocking Issue and Prioritized Processes in Operating System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Heng%20Chia%20Ying">Heng Chia Ying</a>, <a href="https://publications.waset.org/abstracts/search?q=Charmaine%20Tan%20Chai%20Nie"> Charmaine Tan Chai Nie</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Process scheduling is the method of process management that determines which process the CPU will proceed with for the next task and how long it takes. Some issues were found in process management, particularly for Priority Scheduling (PS) and Round Robin Scheduling (RR). The proposed recommendations made for IPRRS are to combine the strengths of both into a combining algorithm while they draw on others to compensate for each weakness. A significant improvement on the combining technique of scheduler, Incorporating Priority Round-Robin Scheduler (IPRRS) address an algorithm for both high and low priority task to sustain the indefinite blocking issue faced in the priority scheduling algorithm and minimize the average turnaround time (ATT) and average waiting time (AWT) in RR scheduling algorithm. This paper will delve into the simple rules introduced by IPRRS and enhancements that both PS and RR bring to the execution of processes in the operating system. Furthermore, it incorporates the best aspects of each algorithm to build the optimum algorithm for a certain case in terms of prioritized processes, ATT, and AWT. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=round%20Robin%20scheduling" title="round Robin scheduling">round Robin scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=priority%20scheduling" title=" priority scheduling"> priority scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=indefinite%20blocking" title=" indefinite blocking"> indefinite blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20management" title=" process management"> process management</a>, <a href="https://publications.waset.org/abstracts/search?q=sustain" title=" sustain"> sustain</a>, <a href="https://publications.waset.org/abstracts/search?q=turnaround%20time" title=" turnaround time"> turnaround time</a> </p> <a href="https://publications.waset.org/abstracts/160706/incorporating-priority-round-robin-scheduler-to-sustain-indefinite-blocking-issue-and-prioritized-processes-in-operating-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160706.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">347</span> IT Perspective of Service-Oriented e-Government Enterprise </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anu%20Paul">Anu Paul</a>, <a href="https://publications.waset.org/abstracts/search?q=Varghese%20Paul"> Varghese Paul</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The focal aspire of e-Government (eGovt) is to offer citizen-centered service delivery. Accordingly, the citizenry consumes services from multiple government agencies through national portal. Thus, eGovt is an enterprise with the primary business motive of transparent, efficient and effective public services to its citizenry and its logical structure is the eGovernment Enterprise Architecture (eGEA). Since eGovt is IT oriented multifaceted service-centric system, EA doesn’t do much on an automated enterprise other than the business artifacts. Service-Oriented Architecture (SOA) manifestation led some governments to pertain this in their eGovts, but it limits the source of business artifacts. The concurrent use of EA and SOA in eGovt executes interoperability and integration and leads to Service-Oriented e-Government Enterprise (SOeGE). Consequently, agile eGovt system becomes a reality. As an IT perspective eGovt comprises of centralized public service artifacts with the existing application logics belong to various departments at central, state and local level. The eGovt is renovating to SOeGE by apply the Service-Orientation (SO) principles in the entire system. This paper explores IT perspective of SOeGE in India which encompasses the public service models and illustrated with a case study the Passport service of India. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=enterprise%20architecture" title="enterprise architecture">enterprise architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=service-oriented%20e-Government%20enterprise" title=" service-oriented e-Government enterprise"> service-oriented e-Government enterprise</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20interface%20layer" title=" service interface layer"> service interface layer</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20model" title=" service model"> service model</a> </p> <a href="https://publications.waset.org/abstracts/21308/it-perspective-of-service-oriented-e-government-enterprise" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21308.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">521</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">346</span> The Hospitals Residents Problem with Bounded Length Preference List under Social Stability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ashish%20Shrivastava">Ashish Shrivastava</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Pandu%20Rangan"> C. Pandu Rangan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we consider The Hospitals Residents problem with Social Stability (HRSS), where hospitals and residents can communicate only through the underlying social network. Those residents and hospitals which don not have any social connection between them can not communicate and hence they cannot be a social blocking pair with respect to a socially stable matching in an instance of hospitals residents problem with social stability. In large scale matching like NRMP or Scottish medical matching scheme etc. where set of agents, as well as length of preference lists, are very large, social stability is a useful notion in which members of a blocking pair could block a matching if and only if they know the existence of each other. Thus the notion of social stability in hospitals residents problem allows us to increase the cardinality of the matching without taking care of those blocking pairs which are not socially connected to each other. We know that finding a maximum cardinality socially stable matching, in an instance, of HRSS is NP-hard. This motivates us to solve this problem with bounded length preference lists on one side. In this paper, we have presented a polynomial time algorithm to compute maximum cardinality socially stable matching in a HRSS instance where residents can give at most two length and hospitals can give unbounded length preference list. Preference lists of residents and hospitals will be strict in nature. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=matching%20under%20preference" title="matching under preference">matching under preference</a>, <a href="https://publications.waset.org/abstracts/search?q=socially%20stable%20matching" title=" socially stable matching"> socially stable matching</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20hospital%20residents%20problem" title=" the hospital residents problem"> the hospital residents problem</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20stable%20marriage%20problem" title=" the stable marriage problem"> the stable marriage problem</a> </p> <a href="https://publications.waset.org/abstracts/57888/the-hospitals-residents-problem-with-bounded-length-preference-list-under-social-stability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57888.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">277</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">345</span> Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zainurrasyid%20Abdullah">Zainurrasyid Abdullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Fadzlee%20Sulaiman"> Mohamed Fadzlee Sulaiman</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Fadzlan%20Zainal"> Muhammad Fadzlan Zainal</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Zabri%20Adil%20Talib"> M. Zabri Adil Talib</a>, <a href="https://publications.waset.org/abstracts/search?q=Aswami%20Fadillah%20M.%20Ariffin"> Aswami Fadillah M. Ariffin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artifacts%20analysis" title="artifacts analysis">artifacts analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title=" digital forensics"> digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20analysis" title=" forensic analysis"> forensic analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=memory%20analysis" title=" memory analysis"> memory analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=registry%20analysis" title=" registry analysis"> registry analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=tor%20browser" title=" tor browser"> tor browser</a>, <a href="https://publications.waset.org/abstracts/search?q=Windows%2010" title=" Windows 10"> Windows 10</a> </p> <a href="https://publications.waset.org/abstracts/89769/digital-forensics-analysis-focusing-on-the-onion-router-browser-artifacts-in-windows-10" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89769.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">344</span> Reducing Hazardous Materials Releases from Railroad Freights through Dynamic Trip Plan Policy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omar%20A.%20Abuobidalla">Omar A. Abuobidalla</a>, <a href="https://publications.waset.org/abstracts/search?q=Mingyuan%20Chen"> Mingyuan Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Satyaveer%20S.%20Chauhan"> Satyaveer S. Chauhan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Railroad transportation of hazardous materials freights is important to the North America economics that supports the national’s supply chain. This paper introduces various extensions of the dynamic hazardous materials trip plan problems. The problem captures most of the operational features of a real-world railroad transportations systems that dynamically initiates a set of blocks and assigns each shipment to a single block path or multiple block paths. The dynamic hazardous materials trip plan policies have distinguishing features that are integrating the blocking plan, and the block activation decisions. We also present a non-linear mixed integer programming formulation for each variant and present managerial insights based on a hypothetical railroad network. The computation results reveal that the dynamic car scheduling policies are not only able to take advantage of the capacity of the network but also capable of diminishing the population, and environment risks by rerouting the active blocks along the least risky train services without sacrificing the cost advantage of the railroad. The empirical results of this research illustrate that the issue of integrating the blocking plan, and the train makeup of the hazardous materials freights must receive closer attentions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dynamic%20car%20scheduling" title="dynamic car scheduling">dynamic car scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=planning%20and%20scheduling%20hazardous%20materials%20freights" title=" planning and scheduling hazardous materials freights"> planning and scheduling hazardous materials freights</a>, <a href="https://publications.waset.org/abstracts/search?q=airborne%20hazardous%20materials" title=" airborne hazardous materials"> airborne hazardous materials</a>, <a href="https://publications.waset.org/abstracts/search?q=gaussian%20plume%20model" title=" gaussian plume model"> gaussian plume model</a>, <a href="https://publications.waset.org/abstracts/search?q=integrated%20blocking%20and%20routing%20plans" title=" integrated blocking and routing plans"> integrated blocking and routing plans</a>, <a href="https://publications.waset.org/abstracts/search?q=box%20model" title=" box model"> box model</a> </p> <a href="https://publications.waset.org/abstracts/71326/reducing-hazardous-materials-releases-from-railroad-freights-through-dynamic-trip-plan-policy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71326.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">205</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">343</span> A Self-Adaptive Stimulus Artifacts Removal Approach for Electrical Stimulation Based Muscle Rehabilitation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yinjun%20Tu">Yinjun Tu</a>, <a href="https://publications.waset.org/abstracts/search?q=Qiang%20Fang"> Qiang Fang</a>, <a href="https://publications.waset.org/abstracts/search?q=Glenn%20I.%20Matthews"> Glenn I. Matthews</a>, <a href="https://publications.waset.org/abstracts/search?q=Shuenn-Yuh%20Lee"> Shuenn-Yuh Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper reports an efficient and rigorous self-adaptive stimulus artifacts removal approach for a mixed surface EMG (Electromyography) and stimulus signal during muscle stimulation. The recording of EMG and the stimulation of muscles were performing simultaneously. It is difficult to generate muscle fatigue feature from the mixed signal, which can be further used in closed loop system. A self-adaptive method is proposed in this paper, the stimulation frequency was calculated and verified firstly. Then, a mask was created based on this stimulation frequency to remove the undesired stimulus. 20 EMG signal recordings were analyzed, and the ANOVA (analysis of variance) approach illustrated that the decreasing trend of median power frequencies was successfully generated from the 'cleaned' EMG signal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=EMG" title="EMG">EMG</a>, <a href="https://publications.waset.org/abstracts/search?q=FES" title=" FES"> FES</a>, <a href="https://publications.waset.org/abstracts/search?q=stimulus%20artefacts" title=" stimulus artefacts"> stimulus artefacts</a>, <a href="https://publications.waset.org/abstracts/search?q=self-adaptive" title=" self-adaptive"> self-adaptive</a> </p> <a href="https://publications.waset.org/abstracts/78969/a-self-adaptive-stimulus-artifacts-removal-approach-for-electrical-stimulation-based-muscle-rehabilitation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78969.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">399</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">342</span> 3D Printing Perceptual Models of Preference Using a Fuzzy Extreme Learning Machine Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xinyi%20Le">Xinyi Le</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, 3D printing orientations were determined through our perceptual model. Some FDM (Fused Deposition Modeling) 3D printers, which are widely used in universities and industries, often require support structures during the additive manufacturing. After removing the residual material, some surface artifacts remain at the contact points. These artifacts will damage the function and visual effect of the model. To prevent the impact of these artifacts, we present a fuzzy extreme learning machine approach to find printing directions that avoid placing supports in perceptually significant regions. The proposed approach is able to solve the evaluation problem by combing both the subjective knowledge and objective information. Our method combines the advantages of fuzzy theory, auto-encoders, and extreme learning machine. Fuzzy set theory is applied for dealing with subjective preference information, and auto-encoder step is used to extract good features without supervised labels before extreme learning machine. An extreme learning machine method is then developed successfully for training and learning perceptual models. The performance of this perceptual model will be demonstrated on both natural and man-made objects. It is a good human-computer interaction practice which draws from supporting knowledge on both the machine side and the human side. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=3d%20printing" title="3d printing">3d printing</a>, <a href="https://publications.waset.org/abstracts/search?q=perceptual%20model" title=" perceptual model"> perceptual model</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20evaluation" title=" fuzzy evaluation"> fuzzy evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=data-driven%20approach" title=" data-driven approach"> data-driven approach</a> </p> <a href="https://publications.waset.org/abstracts/67233/3d-printing-perceptual-models-of-preference-using-a-fuzzy-extreme-learning-machine-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67233.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">438</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">341</span> Cultural Artifact, Sign Language and Perspectives of Meaning in Select-Nollywood Films</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aniekan%20James%20Akpan">Aniekan James Akpan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The use of signs and symbols to represent cardinal information is inalienable among African communities. It has been the tenable instrument of cultural transmission for decades, but in the current transposal of Western values, a good number of communicating codes and symbolic images have been gradually relegated to the background. This paper discusses the regeneration of cultural artifacts and sign languages in Nigerian films using Johnpaul Rebecca and Ayamma as models in a qualitative research based on Charles Sanders Pierce's Semiotics as well as quantitative methods of survey using questionnaire and focus group discussion as instruments to obtain data. With a population of 2,343 viewers of the movies used for the study and a sample size of 322 respondents using Philip Meyer’s guide, findings show that cultural relics can stabilise the subject matter of a film. Artifacts can stimulate curiosity and invoke nostalgia. Sign languages encode deeper information that ordinary speech may not properly convey in films. It concludes that the use of non-verbal codes in filmmaking deserves deep research into the culture portrayed and that non-verbal cues communicate deeper information about a people's cosmos in a film than dialogue. It recommends that adequate research should be made before producing a film and the idea of cultural values represented in artifacts and sign language should be ingrained in the courses for students to acquaint themselves with. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cultural%20artifact" title="cultural artifact">cultural artifact</a>, <a href="https://publications.waset.org/abstracts/search?q=Nollywood%20films" title=" Nollywood films"> Nollywood films</a>, <a href="https://publications.waset.org/abstracts/search?q=non-verbal%20communication" title=" non-verbal communication"> non-verbal communication</a>, <a href="https://publications.waset.org/abstracts/search?q=sign%20language" title=" sign language"> sign language</a> </p> <a href="https://publications.waset.org/abstracts/186149/cultural-artifact-sign-language-and-perspectives-of-meaning-in-select-nollywood-films" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186149.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">45</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">340</span> Cultural Stereotypes in EFL Classrooms and Their Implications on English Language Procedures in Cameroon</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eric%20Enongene%20Ekembe">Eric Enongene Ekembe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recent calls on EFL teaching posit the centrality of context factors and argue for a correlation between effectiveness in teaching with the learners’ culture in the EFL classroom. Context is not everything; it is defined with indicators of learners’ cultural artifacts and stereotypes in meaningful interactions in the language classroom. In keeping with this, it is difficult to universalise pedagogic procedures given that appropriate procedures are context-sensitive- and contexts differ. It is necessary to investigate what counts as cultural specificities or stereotypes of specific learners to reflect on how different language learning contexts affect or are affected by English language teaching procedures, most especially in under-represented cultures, which have appropriated the English language. This paper investigates cultural stereotypes of EFL learners in the culturally diverse Cameroon to examine how they mediate teaching and learning. Data collected on mixed-method basis from 83 EFL teachers and 1321 learners in Cameroon reveal a strong presence of typical cultural artifacts and stereotypes. Statistical analysis and thematic coding demonstrate that teaching procedures in place were insensitive to the cultural artifacts and stereotypes, resulting in trending tension between teachers and learners. The data equally reveal a serious contradiction between the communicative goals of language teaching and learning: what teachers held as effective teaching was diametrically opposed to success in learning. In keeping with this, the paper argues for a ‘decentred’ teacher preparation in Cameroon that is informed by systemic learners’ feedback. On this basis, applied linguistics has the urgent task of exploring dimensions of what actually counts as contextualized practice in ELT. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cultural%20stereotypes" title="cultural stereotypes">cultural stereotypes</a>, <a href="https://publications.waset.org/abstracts/search?q=EFL" title=" EFL"> EFL</a>, <a href="https://publications.waset.org/abstracts/search?q=implications" title=" implications"> implications</a>, <a href="https://publications.waset.org/abstracts/search?q=procedures" title=" procedures"> procedures</a> </p> <a href="https://publications.waset.org/abstracts/134764/cultural-stereotypes-in-efl-classrooms-and-their-implications-on-english-language-procedures-in-cameroon" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134764.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">129</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">339</span> Select-Low and Select-High Methods for the Wheeled Robot Dynamic States Control</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bogus%C5%82aw%20Schreyer">Bogusław Schreyer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper enquires on the two methods of the wheeled robot braking torque control. Those two methods are applied when the adhesion coefficient under left side wheels is different from the adhesion coefficient under the right side wheels. In case of the select-low (SL) method the braking torque on both wheels is controlled by the signals originating from the wheels on the side of the lower adhesion. In the select-high (SH) method the torque is controlled by the signals originating from the wheels on the side of the higher adhesion. The SL method is securing stable and secure robot behaviors during the braking process. However, the efficiency of this method is relatively low. The SH method is more efficient in terms of time and braking distance but in some situations may cause wheels blocking. It is important to monitor the velocity of all wheels and then take a decision about the braking torque distribution accordingly. In case of the SH method the braking torque slope may require significant decrease in order to avoid wheel blocking. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=select-high" title="select-high">select-high</a>, <a href="https://publications.waset.org/abstracts/search?q=select-low" title=" select-low"> select-low</a>, <a href="https://publications.waset.org/abstracts/search?q=torque%20distribution" title=" torque distribution"> torque distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=wheeled%20robots" title=" wheeled robots"> wheeled robots</a> </p> <a href="https://publications.waset.org/abstracts/134319/select-low-and-select-high-methods-for-the-wheeled-robot-dynamic-states-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134319.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">119</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">338</span> Public Libraries as Social Spaces for Vulnerable Populations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Natalie%20Malone">Natalie Malone</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores the role of a public library in the creation of social spaces for vulnerable populations. The data stems from a longitudinal ethnographic study of the Anderson Library community, which included field notes, artifacts, and interview data. Thematic analysis revealed multiple meanings and thematic relationships within and among the data sources -interviews, field notes, and artifacts. Initial analysis suggests the Anderson Library serves as a space for vulnerable populations, with the sub-themes of fostering interpersonal communication to create a social space for children and fostering interpersonal communication to create a social space for parents and adults. These findings are important as they illustrate the potential of public libraries to serve as community empowering institutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=capital" title="capital">capital</a>, <a href="https://publications.waset.org/abstracts/search?q=immigrant%20families" title=" immigrant families"> immigrant families</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20libraries" title=" public libraries"> public libraries</a>, <a href="https://publications.waset.org/abstracts/search?q=space" title=" space"> space</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerable" title=" vulnerable"> vulnerable</a> </p> <a href="https://publications.waset.org/abstracts/129690/public-libraries-as-social-spaces-for-vulnerable-populations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129690.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">151</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=10">10</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=11">11</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=12">12</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=13">13</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=blocking%20artifacts&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>