Search results for: distributed training
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5681

Search results for: distributed training

2711 An AI-Based Dynamical Resource Allocation Calculation Algorithm for Unmanned Aerial Vehicle

Authors: Zhou Luchen, Wu Yubing, Burra Venkata Durga Kumar

Abstract:

As the scale of the network becomes larger and more complex than before, the density of user devices is also increasing. The development of Unmanned Aerial Vehicle (UAV) networks is able to collect and transform data in an efficient way by using software-defined networks (SDN) technology. This paper proposed a three-layer distributed and dynamic cluster architecture to manage UAVs by using an AI-based resource allocation calculation algorithm to address the overloading network problem. Through separating services of each UAV, the UAV hierarchical cluster system performs the main function of reducing the network load and transferring user requests, with three sub-tasks including data collection, communication channel organization, and data relaying. In this cluster, a head node and a vice head node UAV are selected considering the Central Processing Unit (CPU), operational (RAM), and permanent (ROM) memory of devices, battery charge, and capacity. The vice head node acts as a backup that stores all the data in the head node. The k-means clustering algorithm is used in order to detect high load regions and form the UAV layered clusters. The whole process of detecting high load areas, forming and selecting UAV clusters, and moving the selected UAV cluster to that area is proposed as offloading traffic algorithm.

Keywords: k-means, resource allocation, SDN, UAV network, unmanned aerial vehicles

Procedia PDF Downloads 92
2710 An Investigation into Kenyan Teachers’ Views of Children’s Emotional and Behavioural Difficulties

Authors: Fred Mageto

Abstract:

A great number of children in mainstream schools across Kenya are currently living with emotional, behavioural difficulties. This study aims to explore teachers’ perceptions of children’s emotional and behavioural difficulties (EBD) and their attributions of the causes of EBD. The relevance of this area of study to current educational practice is illustrated in the fact that primary school teachers in Kenya find classroom behaviour problems one of the major difficulties they face. The information presented in this study was gathered from 182 teachers that responded back to the survey, of whom 27 teachers were later interviewed. In general, teachers’ perceptions of EBD reflect personal experience, training, and attitudes. Teachers appear from this study to use words such as indifferent, frightened, withdrawn, aggressive, disobedient, hyperactive, less ambitious, lacking concentration, and academically weak to describe pupils with emotional and behavioural difficulties (EBD). The implications of this study are envisaged as being extremely important to support teachers addressing children’s EBD and shed light on the contributing factors to EBD for a successful teaching-learning process in Libyan primary schools.

Keywords: teachers, children, learning, emotional and behaviour difficulties

Procedia PDF Downloads 139
2709 Paraoxonase 1 (PON 1) Arylesterase and Lactonase Activities, Polymorphism and Conjugated Dienes in Gastroenteritis in Paediatric Population

Authors: M. R. Mogarekar, Shraddha V. More, Pankaj Kumar

Abstract:

Gastroenteritis, the third leading killer of children in India today is responsible for 13% of all deaths in children <5 years of age and kills an estimated 300,000 children in India each year. We decided to investigate parameters which can help in early disease detection and prompt treatment. Serum paraoxonase is calcium dependent esterase which is widely distributed among tissues such as liver, kidney, and intestine and is located in the chromosomal region 7q21.3 22.1. Studies show the presence of excessive reactive oxygen metabolites and antioxidant imbalance in the gastrointestinal tract leading to oxidative stress in gastroenteritis. To our knowledge, this is the first ever study done. The objective of present study is to investigate the role of paraoxonase 1 (PON 1) status i.e arylesterase and lactonase activities and Q192R polymorphism and conjugated dienes, in gastroenteritis of paediatric population. The study and control group consists of 40 paediatric patients with and without gastroenteritis. Paraoxonase arylesterase and lactonase activities were assessed and phenotyping was determined. Conjugated dienes were also assessed. PON 1 arylesterase activities in cases (61.494±13.220) and controls (70.942±15.385) and lactonase activities in cases (15.702±1.036) and controls (17.434±1.176) were significantly decreased (p<0.05). There is no significant difference of phenotypic distribution in cases and controls. Conjugated dienes were found significantly increased in patients (0.086±0.024) than the control group (0.064±0.019) (p<0.05). Paraoxonase 1 activities (arylesterase and lactonase) and conjugated dienes may be useful in risk assessment and management in gastroenteritis in paediatric population.

Keywords: paraoxonase 1 polymorphism, arylesterase, lactonase, conjugated dienes, p-nitrophenylacetate, DHC

Procedia PDF Downloads 297
2708 Machine Learning-Enabled Classification of Climbing Using Small Data

Authors: Nicholas Milburn, Yu Liang, Dalei Wu

Abstract:

Athlete performance scoring within the climbing do-main presents interesting challenges as the sport does not have an objective way to assign skill. Assessing skill levels within any sport is valuable as it can be used to mark progress while training, and it can help an athlete choose appropriate climbs to attempt. Machine learning-based methods are popular for complex problems like this. The dataset available was composed of dynamic force data recorded during climbing; however, this dataset came with challenges such as data scarcity, imbalance, and it was temporally heterogeneous. Investigated solutions to these challenges include data augmentation, temporal normalization, conversion of time series to the spectral domain, and cross validation strategies. The investigated solutions to the classification problem included light weight machine classifiers KNN and SVM as well as the deep learning with CNN. The best performing model had an 80% accuracy. In conclusion, there seems to be enough information within climbing force data to accurately categorize climbers by skill.

Keywords: classification, climbing, data imbalance, data scarcity, machine learning, time sequence

Procedia PDF Downloads 130
2707 Elitism: Navigating Professional Diversity Barriers

Authors: Rachel Nir, Tina Mckee

Abstract:

In the UK, reliance has been placed on the professions to ‘heal themselves’ in improving equality and diversity. This approach has faltered, in part due to the global economic climate, and stimulus is needed to make faster equality progress. Recent empirical evidence has identified specific diversity barriers, namely: the cost of training; the use of high school grades as a primary selection criteria; the significance of prior work experience in recruitment decisions; and recruitment from elite universities. Students from majority groups and affluent backgrounds are advantaged over their counterparts. We as educators are passionate about resisting this. We believe that education can be a key agent of change. As part of this belief, the presenters have recently designed learning and teaching materials for the 2015/16 academic year. These are aimed at undergraduate law students for the purpose of 1) educating them on career barriers; 2) helping them to develop personal strategies to overcome them; and 3) encouraging them to address their own biases, both conscious and implicit, so that they, themselves, may be fairer employers and managers in the future.

Keywords: career barriers, challenging professional bias, education, elitism, personal student strategies

Procedia PDF Downloads 223
2706 Noise Measurement and Awareness at Construction Site: A Case Study

Authors: Feiruz Ab'lah, Zarini Ismail, Mohamad Zaki Hassan, Siti Nadia Mohd Bakhori, Mohamad Azlan Suhot, Mohd Yusof Md. Daud, Shamsul Sarip

Abstract:

The construction industry is one of the major sectors in Malaysia. Apart from providing facilities, services, and goods it also offers employment opportunities to local and foreign workers. In fact, the construction workers are exposed to a hazardous level of noises that generated from various sources including excavators, bulldozers, concrete mixer, and piling machines. Previous studies indicated that the piling and concrete work was recorded as the main source that contributed to the highest level of noise among the others. Therefore, the aim of this study is to obtain the noise exposure during piling process and to determine the awareness of workers against noise pollution at the construction site. Initially, the reading of noise was obtained at construction site by using a digital sound level meter (SLM), and noise exposure to the workers was mapped. Readings were taken from four different distances; 5, 10, 15 and 20 meters from the piling machine. Furthermore, a set of questionnaire was also distributed to assess the knowledge regarding noise pollution at the construction site. The result showed that the mean noise level at 5m distance was more than 90 dB which exceeded the recommended level. Although the level of awareness regarding the effect of noise pollution is satisfactory, majority of workers (90%) still did not wear ear protecting device during work period. Therefore, the safety module guidelines related to noise pollution controls should be implemented to provide a safe working environment and prevent initial occupational hearing loss.

Keywords: construction, noise awareness, noise pollution, piling machine

Procedia PDF Downloads 361
2705 An Approximate Lateral-Torsional Buckling Mode Function for Cantilever I-Beams

Authors: H. Ozbasaran

Abstract:

Lateral torsional buckling is a global stability loss which should be considered in the design of slender structural members under flexure about their strong axis. It is possible to compute the load which causes lateral torsional buckling of a beam by finite element analysis, however, closed form equations are needed in engineering practice. Such equations can be obtained by using energy method. Unfortunately, this method has a vital drawback. In lateral torsional buckling applications of energy method, a proper function for the critical lateral torsional buckling mode should be chosen which can be thought as the variation of twisting angle along the buckled beam. The accuracy of the results depends on how close is the chosen function to the exact mode. Since critical lateral torsional buckling mode of the cantilever I-beams varies due to material properties, section properties, and loading case, the hardest step is to determine a proper mode function. This paper presents an approximate function for critical lateral torsional buckling mode of doubly symmetric cantilever I-beams. Coefficient matrices are calculated for the concentrated load at the free end, uniformly distributed load and constant moment along the beam cases. Critical lateral torsional buckling modes obtained by presented function and exact solutions are compared. It is found that the modes obtained by presented function coincide with differential equation solutions for considered loading cases.

Keywords: buckling mode, cantilever, lateral-torsional buckling, I-beam

Procedia PDF Downloads 355
2704 Evaluation of the Practice of Veterinary Pharmacy

Authors: Maria Magdy Danial Riad

Abstract:

Background: In the United Kingdom (UK), pharmacists' roles have expanded considerably in recent decades to encompass clinical practice through more direct patient care. However, dispensing and compounding remain core activities for pharmacists. A lack of marketed preparations for species-specific animal use results in veterinary pharmacy practice compounding, retaining its prominence. Current participation by pharmacists to support this sphere of practice would appear to be minimal. Objectives: This study was undertaken to determine the opinions and views toward the practice of veterinary pharmacy by a cross-sectional group of pharmacists. Methods: Research data were collected via a self-administered survey questionnaire distributed at the 2012 annual conference of the Royal Pharmaceutical Society. Sampling was purposive, with a random distribution of the questionnaire to pharmacists during the conference sessions. Key findings: Interaction by pharmacists with veterinary pharmacies is currently minimal, primarily due to a lack of knowledge of veterinary medicines. Respondents revealed a lack of veterinary pharmacy courses during their undergraduate studies. This has led to situations where some veterinary prescriptions are dispensed without adequate checks being performed by the pharmacist. Pharmacists, on occasion, do not dispense veterinary prescriptions presented to them due to insufficient knowledge of veterinary medicines and/or a lack of consultable reference sources. The effect on practice is that pharmacists do not always participate as fully as would seem logical. Conclusions: Pharmacists' participation in veterinary pharmacy is limited by a lack of knowledge of veterinary medicines, mostly resulting from inadequate tuition on veterinary pharmacy during their initial education.

Keywords: veterinary pharmacy, veterinary medicines, pharmacy education, pharmacists continuing professional development

Procedia PDF Downloads 65
2703 Managing City Pipe Leaks through Community Participation Using a Web and Mobile Application in South Africa

Authors: Mpai Mokoena, Nsenda Lukumwena

Abstract:

South Africa is one of the driest countries in the world and is facing a water crisis. In addition to inadequate infrastructure and poor planning, the country is experiencing high rates of water wastage due to pipe leaks. This study outlines the level of water wastage and develops a smart solution to efficiently manage and reduce the effects of pipe leaks, while monitoring the situation before and after fixing the pipe leaks. To understand the issue in depth, a literature review of journal papers and government reports was conducted. A questionnaire was designed and distributed to the general public. Additionally, the municipality office was contacted from a managerial perspective. The analysis from the study indicated that the majority of the citizens are aware of the water crisis and are willing to participate positively to decrease the level of water wasted. Furthermore, the response from the municipality acknowledged that more practical solutions are needed to reduce water wastage, and resources to attend to pipe leaks swiftly. Therefore, this paper proposes a specific solution for municipalities, local plumbers and citizens to minimize the effects of pipe leaks. The solution provides web and mobile application platforms to report and manage leaks swiftly. The solution is beneficial to the country in achieving water security and would promote a culture of responsibility toward water usage.

Keywords: urban distribution networks, leak management, mobile application, responsible citizens, water crisis, water security

Procedia PDF Downloads 130
2702 Analysis of Land Use, Land Cover Changes in Damaturu, Nigeria: Using Satellite Images

Authors: Isa Muhammad Zumo, Musa Lawan

Abstract:

This study analyzes the land use/land cover changes in Damaturu metropolis from 1986 to 2005. LandSat TM Images of 1986, 1999, and 2005 were used. Built-up lands, agric lands, water body and other lands were created as themes within ILWIS 3.4 software. The images were displayed in False Colour Composite (FCC) for a better visualization and identification of the themes created. Training sample sets were collected based on the ground truth data during field the checks. Statistical data were then extracted from the classified sample set. Area in hectares for each theme was calculated for each year and the result for each land use/land cover types for each study year was compared. From the result, it was found out that built-up areas have a considerable increase from 37.71 hectares in 1986 to 1062.72 hectares in 2005. It has an annual increase rate of approximately 0.34%. The results also reveal that there is a decrease of 5829.66 hectares of other lands (vacant lands) from 1986 to 2005.

Keywords: land use, changes, analysis, environmental pollution

Procedia PDF Downloads 332
2701 Foggy Image Restoration Using Neural Network

Authors: Khader S. Al-Aidmat, Venus W. Samawi

Abstract:

Blurred vision in the misty atmosphere is essential problem which needs to be resolved. To solve this problem, we developed a technique to restore foggy degraded image from its original version using Back-propagation neural network (BP-NN). The suggested technique is based on mapping between foggy scene and its corresponding original scene. Seven different approaches are suggested based on type of features used in image restoration. Features are extracted from spatial and spatial-frequency domain (using DCT). Each of these approaches comes with its own BP-NN architecture depending on type and number of used features. The weight matrix resulted from training each BP-NN represents a fog filter. The performance of these filters are evaluated empirically (using PSNR), and perceptually. By comparing the performance of these filters, the effective features that suits BP-NN technique for restoring foggy images is recognized. This system proved its effectiveness and success in restoring moderate foggy images.

Keywords: artificial neural network, discrete cosine transform, feed forward neural network, foggy image restoration

Procedia PDF Downloads 372
2700 Node Optimization in Wireless Sensor Network: An Energy Approach

Authors: Y. B. Kirankumar, J. D. Mallapur

Abstract:

Wireless Sensor Network (WSN) is an emerging technology, which has great invention for various low cost applications both for mass public as well as for defence. The wireless sensor communication technology allows random participation of sensor nodes with particular applications to take part in the network, which results in most of the uncovered simulation area, where fewer nodes are located at far distances. The drawback of such network would be that the additional energy is spent by the nodes located in a pattern of dense location, using more number of nodes for a smaller distance of communication adversely in a region with less number of nodes and additional energy is again spent by the source node in order to transmit a packet to neighbours, thereby transmitting the packet to reach the destination. The proposed work is intended to develop Energy Efficient Node Placement Algorithm (EENPA) in order to place the sensor node efficiently in simulated area, where all the nodes are equally located on a radial path to cover maximum area at equidistance. The total energy consumed by each node compared to random placement of nodes is less by having equal burden on fewer nodes of far location, having distributed the nodes in whole of the simulation area. Calculating the network lifetime also proves to be efficient as compared to random placement of nodes, hence increasing the network lifetime, too. Simulation is been carried out in a qualnet simulator, results are obtained on par with random placement of nodes with EENP algorithm.

Keywords: energy, WSN, wireless sensor network, energy approach

Procedia PDF Downloads 296
2699 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 39
2698 Intrusion Detection Using Dual Artificial Techniques

Authors: Rana I. Abdulghani, Amera I. Melhum

Abstract:

With the abnormal growth of the usage of computers over networks and under the consideration or agreement of most of the computer security experts who said that the goal of building a secure system is never achieved effectively, all these points led to the design of the intrusion detection systems(IDS). This research adopts a comparison between two techniques for network intrusion detection, The first one used the (Particles Swarm Optimization) that fall within the field (Swarm Intelligence). In this Act, the algorithm Enhanced for the purpose of obtaining the minimum error rate by amending the cluster centers when better fitness function is found through the training stages. Results show that this modification gives more efficient exploration of the original algorithm. The second algorithm used a (Back propagation NN) algorithm. Finally a comparison between the results of two methods used were based on (NSL_KDD) data sets for the construction and evaluation of intrusion detection systems. This research is only interested in clustering the two categories (Normal and Abnormal) for the given connection records. Practices experiments result in intrude detection rate (99.183818%) for EPSO and intrude detection rate (69.446416%) for BP neural network.

Keywords: IDS, SI, BP, NSL_KDD, PSO

Procedia PDF Downloads 369
2697 Cicadas: A Clinician-assisted, Closed-loop Technology, Mobile App for Adolescents with Autism Spectrum Disorders

Authors: Bruno Biagianti, Angela Tseng, Kathy Wannaviroj, Allison Corlett, Megan DuBois, Kyu Lee, Suma Jacob

Abstract:

Background: ASD is characterized by pervasive Sensory Processing Abnormalities (SPA) and social cognitive deficits that persist throughout the course of the illness and have been linked to functional abnormalities in specific neural systems that underlie the perception, processing, and representation of sensory information. SPA and social cognitive deficits are associated with difficulties in interpersonal relationships, poor development of social skills, reduced social interactions and lower academic performance. Importantly, they can hamper the effects of established evidence-based psychological treatments—including PEERS (Program for the Education and Enrichment of Relationship Skills), a parent/caregiver-assisted, 16-weeks social skills intervention—which nonetheless requires a functional brain capable of assimilating and retaining information and skills. As a matter of fact, some adolescents benefit from PEERS more than others, calling for strategies to increase treatment response rates. Objective: We will present interim data on CICADAS (Care Improving Cognition for ADolescents on the Autism Spectrum)—a clinician-assisted, closed-loop technology mobile application for adolescents with ASD. Via ten mobile assessments, CICADAS captures data on sensory processing abnormalities and associated cognitive deficits. These data populate a machine learning algorithm that tailors the delivery of ten neuroplasticity-based social cognitive training (NB-SCT) exercises targeting sensory processing abnormalities. Methods: In collaboration with the Autism Spectrum and Neurodevelopmental Disorders Clinic at the University of Minnesota, we conducted a fully remote, three-arm, randomized crossover trial with adolescents with ASD to document the acceptability of CICADAS and evaluate its potential as a stand-alone treatment or as a treatment enhancer of PEERS. Twenty-four adolescents with ASD (ages 11-18) have been initially randomized to 16 weeks of PEERS + CICADAS (Arm A) vs. 16 weeks of PEERS + computer games vs. 16 weeks of CICADAS alone (Arm C). After 16 weeks, the full battery of assessments has been remotely administered. Results: We have evaluated the acceptability of CICADAS by examining adherence rates, engagement patterns, and exit survey data. We found that: 1) CICADAS is able to serve as a treatment enhancer for PEERS, inducing greater improvements in sensory processing, cognition, symptom reduction, social skills and behaviors, as well as the quality of life compared to computer games; 2) the concurrent delivery of PEERS and CICADAS induces greater improvements in study outcomes compared to CICADAS only. Conclusion: While preliminary, our results indicate that the individualized assessment and treatment approach designed in CICADAS seems effective in inducing adaptive long-term learning about social-emotional events. CICADAS-induced enhancement of processing and cognition facilitates the application of PEERS skills in the environment of adolescents with ASD, thus improving their real-world functioning.

Keywords: ASD, social skills, cognitive training, mobile app

Procedia PDF Downloads 192
2696 Analysis of Q-Learning on Artificial Neural Networks for Robot Control Using Live Video Feed

Authors: Nihal Murali, Kunal Gupta, Surekha Bhanot

Abstract:

Training of artificial neural networks (ANNs) using reinforcement learning (RL) techniques is being widely discussed in the robot learning literature. The high model complexity of ANNs along with the model-free nature of RL algorithms provides a desirable combination for many robotics applications. There is a huge need for algorithms that generalize using raw sensory inputs, such as vision, without any hand-engineered features or domain heuristics. In this paper, the standard control problem of line following robot was used as a test-bed, and an ANN controller for the robot was trained on images from a live video feed using Q-learning. A virtual agent was first trained in simulation environment and then deployed onto a robot’s hardware. The robot successfully learns to traverse a wide range of curves and displays excellent generalization ability. Qualitative analysis of the evolution of policies, performance and weights of the network provide insights into the nature and convergence of the learning algorithm.

Keywords: artificial neural networks, q-learning, reinforcement learning, robot learning

Procedia PDF Downloads 358
2695 Modeling Default Probabilities of the Chosen Czech Banks in the Time of the Financial Crisis

Authors: Petr Gurný

Abstract:

One of the most important tasks in the risk management is the correct determination of probability of default (PD) of particular financial subjects. In this paper a possibility of determination of financial institution’s PD according to the credit-scoring models is discussed. The paper is divided into the two parts. The first part is devoted to the estimation of the three different models (based on the linear discriminant analysis, logit regression and probit regression) from the sample of almost three hundred US commercial banks. Afterwards these models are compared and verified on the control sample with the view to choose the best one. The second part of the paper is aimed at the application of the chosen model on the portfolio of three key Czech banks to estimate their present financial stability. However, it is not less important to be able to estimate the evolution of PD in the future. For this reason, the second task in this paper is to estimate the probability distribution of the future PD for the Czech banks. So, there are sampled randomly the values of particular indicators and estimated the PDs’ distribution, while it’s assumed that the indicators are distributed according to the multidimensional subordinated Lévy model (Variance Gamma model and Normal Inverse Gaussian model, particularly). Although the obtained results show that all banks are relatively healthy, there is still high chance that “a financial crisis” will occur, at least in terms of probability. This is indicated by estimation of the various quantiles in the estimated distributions. Finally, it should be noted that the applicability of the estimated model (with respect to the used data) is limited to the recessionary phase of the financial market.

Keywords: credit-scoring models, multidimensional subordinated Lévy model, probability of default

Procedia PDF Downloads 439
2694 Agro Morphological Characterization of Vicia faba L. Accessions in the Kingdom of Saudi Arabia

Authors: Zia Amjad, Salem Safar Alghamdi

Abstract:

This experiment was carried out at student educational farm College of Food and Agriculture, KSU, kingdom of Saudi Arabia; in order to characterize 154 Vicia faba, characterization, PCA, ago-morphological diversity. Icia faba L. accessions were based on ipove and ibpgr descriptors. 24 agro-morphological characters including 11 quantitative and 13 qualitative were observed for genetic variation. All the results were analyzed using multivariate analysis i.e. principle component analysis. First 6 principle components with eigenvalue greater than one; accounted for 72% of available Vicia faba genetic diversity. However, first three components revealed more than 10% of genetic diversity each i.e. 22.36%, 15.86%, and 10.89% respectively. PCA distributed the V. faba accessions into different groups based on their performance for the characters under observation. PC-1 which represented 22.36% of the genetic diversity was positively associated with stipule spot pigmentation, intensity of streaks, pod degree of curvature and to some extent with 100 seed weight. PC-2 covered 15.86 of the genetic diversity and showed positive association for average seed weight per plant, pod length, number of seeds per plant, 100 seed weight, stipule spot pigmentation, intensity of streaks (same as in PC-1), and to some extent for pod degree of curvature and number of pods per plant. PC-3 revealed 10.89% of genetic diversity and expressed positive association for number of pods per plant and number of leaflets per plant.

Keywords: Vicia faba, characterization, PCA, ago-morphological diversity

Procedia PDF Downloads 437
2693 Allometric Models for Biomass Estimation in Savanna Woodland Area, Niger State, Nigeria

Authors: Abdullahi Jibrin, Aishetu Abdulkadir

Abstract:

The development of allometric models is crucial to accurate forest biomass/carbon stock assessment. The aim of this study was to develop a set of biomass prediction models that will enable the determination of total tree aboveground biomass for savannah woodland area in Niger State, Nigeria. Based on the data collected through biometric measurements of 1816 trees and destructive sampling of 36 trees, five species specific and one site specific models were developed. The sample size was distributed equally between the five most dominant species in the study site (Vitellaria paradoxa, Irvingia gabonensis, Parkia biglobosa, Anogeissus leiocarpus, Pterocarpus erinaceous). Firstly, the equations were developed for five individual species. Secondly these five species were mixed and were used to develop an allometric equation of mixed species. Overall, there was a strong positive relationship between total tree biomass and the stem diameter. The coefficient of determination (R2 values) ranging from 0.93 to 0.99 P < 0.001 were realised for the models; with considerable low standard error of the estimates (SEE) which confirms that the total tree above ground biomass has a significant relationship with the dbh. The F-test value for the biomass prediction models were also significant at p < 0.001 which indicates that the biomass prediction models are valid. This study recommends that for improved biomass estimates in the study site, the site specific biomass models should preferably be used instead of using generic models.

Keywords: allometriy, biomass, carbon stock , model, regression equation, woodland, inventory

Procedia PDF Downloads 431
2692 Science of Social Work: Recognizing Its Existence as a Scientific Discipline by a Method Triangulation

Authors: Sandra Mendes

Abstract:

Social Work has encountered over time with multivariate requests in the field of its action, provisioning frameworks of knowledge and praxis. Over the years, we have observed a transformation of society and, consequently, of the public who deals with the social work practitioners. Both, training and profession have had need to adapt and readapt the ways of doing, bailing up theories to action, while action unfolds emancipation of new theories. The theoretical questioning of this subject lies on classical authors from social sciences, and contemporary authors of Social Work. In fact, both enhance, in the design of social work, an integration and social cohesion function, creating a culture of action and theory, attributing to its method a relevant function, which shall be promoter of social changes in various dimensions of both individual and collective life, as well as scientific knowledge. On the other hand, it is assumed that Social Work, through its professionalism and through the academy, is now closer to distinguish itself from other Social Sciences as an autonomous scientific field, being, however, in the center of power struggles. This paper seeks to fill the gap in social work literature about the study of the scientific field of this area of knowledge.

Keywords: field theory, knowledge, science, social work

Procedia PDF Downloads 331
2691 Factors Affecting and Impeding Teachers’ Use of Learning Management System in Kingdom of Saudi Arabia Universities

Authors: Omran Alharbi, Victor Lally

Abstract:

The advantages of the adoption of new technology such as learning management systems (LMSs) in education and teaching methods have been widely recognised. This has led a large number of universities to integrate this type of technology into their daily learning and teaching activities in order to facilitate the education process for both learners and teachers. On the other hand, in some developing countries such as Saudi Arabia, educators have seldom used this technology. As a result, this study was conducted in order to investigate the factors that impede teachers’ use of technology (LMSs) in their teaching in Saudi Arabian institutions. This study used a qualitative approach. Eight participants were invited to take part in this study, and they were asked to give their opinions about the most significant factors that prevented them from integrating technology into their daily activities. The results revealed that a lack of LMS skills, interest in and knowledge about the LMS among teachers were the most significant factors impeding them from using technology in their lessons. The participants suggested that incentive training should be provided to reduce these challenges.

Keywords: LMS, factors, KSA, teachers

Procedia PDF Downloads 114
2690 Analysis of a Discrete-time Geo/G/1 Queue Integrated with (s, Q) Inventory Policy at a Service Facility

Authors: Akash Verma, Sujit Kumar Samanta

Abstract:

This study examines a discrete-time Geo/G/1 queueing-inventory system attached with (s, Q) inventory policy. Assume that the customers follow the Bernoulli process on arrival. Each customer demands a single item with arbitrarily distributed service time. The inventory is replenished by an outside supplier, and the lead time for the replenishment is determined by a geometric distribution. There is a single server and infinite waiting space in this facility. Demands must wait in the specified waiting area during a stock-out period. The customers are served on a first-come-first-served basis. With the help of the embedded Markov chain technique, we determine the joint probability distributions of the number of customers in the system and the number of items in stock at the post-departure epoch using the Matrix Analytic approach. We relate the system length distribution at post-departure and outside observer's epochs to determine the joint probability distribution at the outside observer's epoch. We use probability distributions at random epochs to determine the waiting time distribution. We obtain the performance measures to construct the cost function. The optimum values of the order quantity and reordering point are found numerically for the variety of model parameters.

Keywords: discrete-time queueing inventory model, matrix analytic method, waiting-time analysis, cost optimization

Procedia PDF Downloads 18
2689 The Use of Social Media and Its Impact on the Learning Behavior of ESL University Students for Sustainable Education in Pakistan

Authors: Abdullah Mukhtar, Shehroz Mukhtar, Amina Mukhtar, Choudhry Shahid, Hafiz Raza Razzaq, Saif Ur Rahman

Abstract:

The aim of this study is to find out the negative and positive impacts of social media platforms on the attitude of learning and educational environment of student’s community. Social Media platforms have become a source of collaboration with one another throughout the globe making it a small world. This study performs focalized investigation of the adverse and constructive factors that have a strong impact not only on the psychological adjustments but also on the academic performance of peers. This study is a quantitative research adopting random sampling method in which the participants were the students of university. Researcher distributed 1000 questionnaires among the university students from different departments and asked them to fill the data on Lickert Scale. The participants are from the age group of 18-24 years. Study applies user and gratification theory in order to examine behavior of students practicing social media in their academic and personal life. Findings of the study reveal that the use of social media platforms in Pakistani context has less positive impact as compared to negative impacts on the behavior of students towards learning. The research suggests that usage of online social media platforms should be taught to students; awareness must the created among the users of social media by the means of seminars, workshops and by media itself to overcome the negative impacts of social media leading towards sustainable education in Pakistan.

Keywords: social media, positive impact, negative impact, learning behaviour

Procedia PDF Downloads 44
2688 Early Diagnosis of Myocardial Ischemia Based on Support Vector Machine and Gaussian Mixture Model by Using Features of ECG Recordings

Authors: Merve Begum Terzi, Orhan Arikan, Adnan Abaci, Mustafa Candemir

Abstract:

Acute myocardial infarction is a major cause of death in the world. Therefore, its fast and reliable diagnosis is a major clinical need. ECG is the most important diagnostic methodology which is used to make decisions about the management of the cardiovascular diseases. In patients with acute myocardial ischemia, temporary chest pains together with changes in ST segment and T wave of ECG occur shortly before the start of myocardial infarction. In this study, a technique which detects changes in ST/T sections of ECG is developed for the early diagnosis of acute myocardial ischemia. For this purpose, a database of real ECG recordings that contains a set of records from 75 patients presenting symptoms of chest pain who underwent elective percutaneous coronary intervention (PCI) is constituted. 12-lead ECG’s of the patients were recorded before and during the PCI procedure. Two ECG epochs, which are the pre-inflation ECG which is acquired before any catheter insertion and the occlusion ECG which is acquired during balloon inflation, are analyzed for each patient. By using pre-inflation and occlusion recordings, ECG features that are critical in the detection of acute myocardial ischemia are identified and the most discriminative features for the detection of acute myocardial ischemia are extracted. A classification technique based on support vector machine (SVM) approach operating with linear and radial basis function (RBF) kernels to detect ischemic events by using ST-T derived joint features from non-ischemic and ischemic states of the patients is developed. The dataset is randomly divided into training and testing sets and the training set is used to optimize SVM hyperparameters by using grid-search method and 10fold cross-validation. SVMs are designed specifically for each patient by tuning the kernel parameters in order to obtain the optimal classification performance results. As a result of implementing the developed classification technique to real ECG recordings, it is shown that the proposed technique provides highly reliable detections of the anomalies in ECG signals. Furthermore, to develop a detection technique that can be used in the absence of ECG recording obtained during healthy stage, the detection of acute myocardial ischemia based on ECG recordings of the patients obtained during ischemia is also investigated. For this purpose, a Gaussian mixture model (GMM) is used to represent the joint pdf of the most discriminating ECG features of myocardial ischemia. Then, a Neyman-Pearson type of approach is developed to provide detection of outliers that would correspond to acute myocardial ischemia. Neyman – Pearson decision strategy is used by computing the average log likelihood values of ECG segments and comparing them with a range of different threshold values. For different discrimination threshold values and number of ECG segments, probability of detection and probability of false alarm values are computed, and the corresponding ROC curves are obtained. The results indicate that increasing number of ECG segments provide higher performance for GMM based classification. Moreover, the comparison between the performances of SVM and GMM based classification showed that SVM provides higher classification performance results over ECG recordings of considerable number of patients.

Keywords: ECG classification, Gaussian mixture model, Neyman–Pearson approach, support vector machine

Procedia PDF Downloads 145
2687 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 204
2686 Deep Learning Based Text to Image Synthesis for Accurate Facial Composites in Criminal Investigations

Authors: Zhao Gao, Eran Edirisinghe

Abstract:

The production of an accurate sketch of a suspect based on a verbal description obtained from a witness is an essential task for most criminal investigations. The criminal investigation system employs specifically trained professional artists to manually draw a facial image of the suspect according to the descriptions of an eyewitness for subsequent identification. Within the advancement of Deep Learning, Recurrent Neural Networks (RNN) have shown great promise in Natural Language Processing (NLP) tasks. Additionally, Generative Adversarial Networks (GAN) have also proven to be very effective in image generation. In this study, a trained GAN conditioned on textual features such as keywords automatically encoded from a verbal description of a human face using an RNN is used to generate photo-realistic facial images for criminal investigations. The intention of the proposed system is to map corresponding features into text generated from verbal descriptions. With this, it becomes possible to generate many reasonably accurate alternatives to which the witness can use to hopefully identify a suspect from. This reduces subjectivity in decision making both by the eyewitness and the artist while giving an opportunity for the witness to evaluate and reconsider decisions. Furthermore, the proposed approach benefits law enforcement agencies by reducing the time taken to physically draw each potential sketch, thus increasing response times and mitigating potentially malicious human intervention. With publically available 'CelebFaces Attributes Dataset' (CelebA) and additionally providing verbal description as training data, the proposed architecture is able to effectively produce facial structures from given text. Word Embeddings are learnt by applying the RNN architecture in order to perform semantic parsing, the output of which is fed into the GAN for synthesizing photo-realistic images. Rather than the grid search method, a metaheuristic search based on genetic algorithms is applied to evolve the network with the intent of achieving optimal hyperparameters in a fraction the time of a typical brute force approach. With the exception of the ‘CelebA’ training database, further novel test cases are supplied to the network for evaluation. Witness reports detailing criminals from Interpol or other law enforcement agencies are sampled on the network. Using the descriptions provided, samples are generated and compared with the ground truth images of a criminal in order to calculate the similarities. Two factors are used for performance evaluation: The Structural Similarity Index (SSIM) and the Peak Signal-to-Noise Ratio (PSNR). A high percentile output from this performance matrix should attribute to demonstrating the accuracy, in hope of proving that the proposed approach can be an effective tool for law enforcement agencies. The proposed approach to criminal facial image generation has potential to increase the ratio of criminal cases that can be ultimately resolved using eyewitness information gathering.

Keywords: RNN, GAN, NLP, facial composition, criminal investigation

Procedia PDF Downloads 144
2685 Electrokinetic Regulation of Flow in Microcrack Reservoirs

Authors: Aslanova Aida Ramiz

Abstract:

One of the important aspects of rheophysical problems in oil and gas extraction is the regulation of thermohydrodynamic properties of liquid systems using physical and physicochemical methods. It is known that the constituent parts of real fluid systems in oil and gas production are practically non-conducting, non-magnetically active components. Real heterogeneous hydrocarbon systems, from the structural point of view, consist of an infinite number of microscopic local ion-electrostatic cores distributed in the volume of the dispersion medium. According to Cohen's rule, double electric layers are formed at the contact boundaries of components in contact (oil-gas, oil-water, water-condensate, etc.) in a heterogeneous system, and as a result, each real fluid system can be represented as a complex composition of a set of local electrostatic fields. The electrokinetic properties of this structure are characterized by a certain electrode potential. Prof. F.H. Valiyev called this potential the α-factor and came up with the idea that many natural and technological rheophysical processes (effects) are essentially electrokinetic in nature, and by changing the α-factor, it is possible to adjust the physical properties of real hydraulic systems, including thermohydrodynamic parameters. Based on this idea, extensive research work was conducted, and the possibility of reducing hydraulic resistances and improving rheological properties was experimentally discovered in real liquid systems by reducing the electrical potential with various physical and chemical methods.

Keywords: microcracked, electrode potential, hydraulic resistance, Newtonian fluid, rheophysical properties

Procedia PDF Downloads 60
2684 Artificial Intelligence as a User of Copyrighted Work: Descriptive Study

Authors: Dominika Collett

Abstract:

AI applications, such as machine learning, require access to a vast amount of data in the training phase, which can often be the subject of copyright protection. During later usage, the various content with which the application works can be recorded or made available on the basis of which it produces the resulting output. The EU has recently adopted new legislation to secure machine access to protected works under the DSM Directive; but, the issue of machine use of copyright works is not clearly addressed. However, such clarity is needed regarding the increasing importance of AI and its development. Therefore, this paper provides a basic background of the technology used in the development of applications in the field of computer creativity. The second part of the paper then will focus on a legal analysis of machine use of the authors' works from the perspective of existing European and Czech legislation. The main results of the paper discuss the potential collision of existing legislation in regards to machine use of works with special focus on exceptions and limitations. The legal regulation of machine use of copyright work will impact the development of AI technology.

Keywords: copyright, artificial intelligence, legal use, infringement, Czech law, EU law, text and data mining

Procedia PDF Downloads 112
2683 An Investigation into Libyan Teachers’ Views of Children’s Emotional and Behavioral Difficulties

Authors: Abdelbasit Gadour

Abstract:

A great number of children in mainstream schools across Libya are currently living with emotional, behavioral difficulties. This study aims to explore teachers’ perceptions of children’s emotional and behavioral difficulties (EBD) and their attributions of the causes of EBD. The relevance of this area of study to current educational practice is illustrated in the fact that primary school teachers in Libya find classroom behavior problems one of the major difficulties they face. The information presented in this study was gathered from 182 teachers that responded back to the survey, of whom 27 teachers were later interviewed. In general, teachers’ perceptions of EBD reflect personal experience, training, and attitudes. Teachers appear from this study to use words such as indifferent, frightened, withdrawn, aggressive, disobedient, hyperactive, less ambitious, lacking concentration, and academically weak to describe pupils with emotional and behavioral difficulties (EBD). The implications of this study are envisaged as being extremely important to support teachers addressing children’s EBD and shed light on the contributing factors to EBD for a successful teaching-learning process in Libyan primary schools.

Keywords: children, emotional and behavior difficulties, learning, teachers'

Procedia PDF Downloads 130
2682 The Impact of Sustainable Farm Management on Paddy Farmers’ Livelihood: The Case of Malaysia

Authors: Roslina Kamaruddin

Abstract:

The paddy farmer’s performance and ability to improve productivity for increased incomes is driven by their level of farm management practices. Knowledge on the nature and level of sustainable farm management (SFM) practice provides opportunities for supporting the competitive advantages of paddy farmers to sustainably break away from the poverty cycle. Little attention has been given to measuring the performance and impact of SFM for the improvement of paddy farmer's livelihood in Malaysia. Without understanding SFM, it is difficult to make policies and provide targeted, impactful support to paddy farmers. The objective of this study is to assess the level of SFM among paddy farmers by calculating the Sustainable Farm Management Index (SFMI) using the Rice Check (RC) guideline established by the Department of Agriculture. The structured questionnaire was designed to capture the nine elements of farming practices based on the RC and was then distributed to 788 paddy farmers in Malaysia's main granary areas, namely MADA, KADA, and BLS. Each practice was given a score to determine whether the guidelines were followed. The index ranges from 0 to 100, with 0 being unsustainable and 100 being highly sustainable. A multiple regression analysis was employed as well to estimate the effects of SFM adoption on farmer livelihoods. The findings show that adopting SFM has a positive and significant effect on farmers' livelihoods. The paper, therefore, recommends that farmers should be educated on the importance of sustainable farming practices as this is essential for the sustainable livelihood development of poor farmers who rely on government subsidies.

Keywords: sustainable farm management, paddy farming, rice check, granary areas, farmers livelihood

Procedia PDF Downloads 82