Search results for: false consensus
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 814

Search results for: false consensus

514 Track Initiation Method Based on Multi-Algorithm Fusion Learning of 1DCNN And Bi-LSTM

Authors: Zhe Li, Aihua Cai

Abstract:

Aiming at the problem of high-density clutter and interference affecting radar detection target track initiation in ECM and complex radar mission, the traditional radar target track initiation method has been difficult to adapt. To this end, we propose a multi-algorithm fusion learning track initiation algorithm, which transforms the track initiation problem into a true-false track discrimination problem, and designs an algorithm based on 1DCNN(One-Dimensional CNN)combined with Bi-LSTM (Bi-Directional Long Short-Term Memory )for fusion classification. The experimental dataset consists of real trajectories obtained from a certain type of three-coordinate radar measurements, and the experiments are compared with traditional trajectory initiation methods such as rule-based method, logical-based method and Hough-transform-based method. The simulation results show that the overall performance of the multi-algorithm fusion learning track initiation algorithm is significantly better than that of the traditional method, and the real track initiation rate can be effectively improved under high clutter density with the average initiation time similar to the logical method.

Keywords: track initiation, multi-algorithm fusion, 1DCNN, Bi-LSTM

Procedia PDF Downloads 51
513 The Global Economic System and the Third World Development

Authors: Monday Dickson

Abstract:

Shortly before the end of the second world war, allied leaders and other western powers designed an economic regime that would foster, among other things, global economic reconstruction, prosperity and overall development of countries of the world. They founded both the World Bank and the International Monetary Fund (IMF), with a general consensus that while the latter should specialize in monitoring global and national economies and acting as a lender of last resort, the former should focus on fighting poverty and promoting development. In setting the rules for world trade, the General Agreement on Trade and Tariffs (GATT) evolved into the World Trade Organisation (WTO). This paper, therefore, examines the impact of the activities of these institutions on the transformation and development aspirations of countries of the Third World. The study adopts the descriptive and analytical methods of investigation and derived relevant secondary data from books, journal articles, encyclopedia as well as reports from countries of the Third World. Findings show that rather than fostering poverty reduction and overall development as envisaged, the activities of global economy system leads to the “development of underdevelopment” of the Third World Countries. The strategic options that are available to countries of the Third World derived from the ability of the national governments to develop programmes of systematic exploration and exploitation of vital indices of relations with strategic countries to advance their development agenda.

Keywords: development, global economic system, prosperity, third world

Procedia PDF Downloads 412
512 Effects of Initial State on Opinion Formation in Complex Social Networks with Noises

Authors: Yi Yu, Vu Xuan Nguyen, Gaoxi Xiao

Abstract:

Opinion formation in complex social networks may exhibit complex system dynamics even when based on some simplest system evolution models. An interesting and important issue is the effects of the initial state on the final steady-state opinion distribution. By carrying out extensive simulations and providing necessary discussions, we show that, while different initial opinion distributions certainly make differences to opinion evolution in social systems without noises, in systems with noises, given enough time, different initial states basically do not contribute to making any significant differences in the final steady state. Instead, it is the basal distribution of the preferred opinions that contributes to deciding the final state of the systems. We briefly explain the reasons leading to the observed conclusions. Such an observation contradicts with a long-term belief on the roles of system initial state in opinion formation, demonstrating the dominating role that opinion mutation can play in opinion formation given enough time. The observation may help to better understand certain observations of opinion evolution dynamics in real-life social networks.

Keywords: opinion formation, Deffuant model, opinion mutation, consensus making

Procedia PDF Downloads 152
511 The Polarization on Twitter and COVID-19 Vaccination in Brazil

Authors: Giselda Cristina Ferreira, Carlos Alberto Kamienski, Ana Lígia Scott

Abstract:

The COVID-19 pandemic has enhanced the anti-vaccination movement in Brazil, supported by unscientific theories and false news and the possibility of wide communication through social networks such as Twitter, Facebook, and YouTube. The World Health Organization (WHO) classified the large volume of information on the subject against COVID-19 as an Infodemic. In this paper, we present a protocol to identify polarizing users (called polarizers) and study the profiles of Brazilian polarizers on Twitter (renamed to X some weeks ago). We analyzed polarizing interactions on Twitter (in Portuguese) to identify the main polarizers and how the conflicts they caused influenced the COVID-19 vaccination rate throughout the pandemic. This protocol uses data from this social network, graph theory, Java, and R-studio scripts to model and analyze the data. The information about the vaccination rate was obtained in a public database for the government called OpenDataSus. The results present the profiles of Twitter’s Polarizer (political position, gender, professional activity, immunization opinions). We observed that social and political events influenced the participation of these different profiles in conflicts and the vaccination rate.

Keywords: Twitter, polarization, vaccine, Brazil

Procedia PDF Downloads 42
510 An Action Toolkit for Health Care Services Driving Disability Inclusion in Universal Health Coverage

Authors: Jill Hanass-Hancock, Bradley Carpenter, Samantha Willan, Kristin Dunkle

Abstract:

Access to quality health care for persons with disabilities is the litmus test in our strive toward universal health coverage. Persons with disabilities experience a variety of health disparities related to increased health risks, greater socioeconomic challenges, and persistent ableism in the provision of health care. In low- and middle-income countries, the support needed to address the diverse needs of persons with disabilities and close the gaps in inclusive and accessible health care can appear overwhelming to staff with little knowledge and tools available. An action-orientated disability inclusion toolkit for health facilities was developed through consensus-building consultations and field testing in South Africa. The co-creation of the toolkit followed a bottom-up approach with healthcare staff and persons with disabilities in two developmental cycles. In cycle one, a disability facility assessment tool was developed to increase awareness of disability accessibility and service delivery gaps in primary healthcare services in a simple and action-orientated way. In cycle two, an intervention menu was created, enabling staff to respond to identified gaps and improve accessibility and inclusion. Each cycle followed five distinct steps of development: a review of needs and existing tools, design of the draft tool, consensus discussion to adapt the tool, pilot-testing and adaptation of the tool, and identification of the next steps. The continued consultations, adaptations, and field-testing allowed the team to discuss and test several adaptations while co-creating a meaningful and feasible toolkit with healthcare staff and persons with disabilities. This approach led to a simplified tool design with ‘key elements’ needed to achieve universal health coverage: universal design of health facilities, reasonable accommodation, health care worker training, and care pathway linkages. The toolkit was adapted for paper or digital data entry, produces automated, instant facility reports, and has easy-to-use training guides and online modules. The cyclic approach enabled the team to respond to emerging needs. The pilot testing of the facility assessment tool revealed that healthcare workers took significant actions to change their facilities after an assessment. However, staff needed information on how to improve disability accessibility and inclusion, where to acquire accredited training, and how to improve disability data collection, referrals, and follow-up. Hence, intervention options were needed for each ‘key element’. In consultation with representatives from the health and disability sectors, tangible and feasible solutions/interventions were identified. This process included the development of immediate/low-cost and long-term solutions. The approach gained buy-in from both sectors, who called for including the toolkit in the standard quality assessments for South Africa’s health care services. Furthermore, the process identified tangible solutions for each ‘key element’ and highlighted where research and development are urgently needed. The cyclic and consultative approach enabled the development of a feasible facility assessment tool and a complementary intervention menu, moving facilities toward universal health coverage for and persons with disabilities in low- or better-resourced contexts while identifying gaps in the availability of interventions.

Keywords: public health, disability, accessibility, inclusive health care, universal health coverage

Procedia PDF Downloads 48
509 Formative Assessment in an Introductory Python Programming Course

Authors: María José Núñez-Ruiz, Luis Álvarez-González, Cristian Olivares-Rodriguez, Benjamin Lazo-Letelier

Abstract:

This paper begins with some concept of formative assessment and the relationship with learning objective: contents objectives, processes objectives, and metacognitive objectives. Two methodologies are describes Evidence-Based teaching and Question Drive Instruction. To do formative assessments in larges classes a Classroom Response System (CRS) is needed. But most of CRS use only Multiple Choice Questions (MCQ), True/False question, or text entry; however, this is insufficient to formative assessment. To do that a new CRS, call FAMA was developed. FAMA support six types of questions: Choice, Order, Inline choice, Text entry, Associated, and Slider. An experiment participated in 149 students from four engineering careers. For results, Kendall's Range Correlation Analysis and descriptive analysis was done. In conclusion, there is a strong relation between contents question, process questions (ask in formative assessment without a score) and metacognitive questions, asked in summative assessment. As future work, the lecturer can do personalized teaching, because knows the behavior of all students in each formative assessment

Keywords: Python language, formative assessment, classroom response systems, evidence-Based teaching, question drive instruction

Procedia PDF Downloads 106
508 Using Blockchain Technology to Extend the Vendor Managed Inventory for Sustainability

Authors: Elham Ahmadi, Roshaali Khaturia, Pardis Sahraei, Mohammad Niyayesh, Omid Fatahi Valilai

Abstract:

Nowadays, Information Technology (IT) is changing the way traditional enterprise management concepts work. One of the most dominant IT achievements is the Blockchain Technology. This technology enables the distributed collaboration of stakeholders for their interactions while fulfilling the security and consensus rules among them. This paper has focused on the application of Blockchain technology to enhance one of traditional inventory management models. The Vendor Managed Inventory (VMI) has been considered one of the most efficient mechanisms for vendor inventory planning by the suppliers. While VMI has brought competitive advantages for many industries, however its centralized mechanism limits the collaboration of a pool of suppliers and vendors simultaneously. This paper has studied the recent research for VMI application in industries and also has investigated the applications of Blockchain technology for decentralized collaboration of stakeholders. Focusing on sustainability issue for total supply chain consisting suppliers and vendors, it has proposed a Blockchain based VMI conceptual model. The different capabilities of this model for enabling the collaboration of stakeholders while maintaining the competitive advantages and sustainability issues have been discussed.

Keywords: vendor managed inventory, VMI, blockchain technology, supply chain planning, sustainability

Procedia PDF Downloads 193
507 Regulating Information Asymmetries at Online Platforms for Short-Term Vacation Rental in European Union– Legal Conondrum Continues

Authors: Vesna Lukovic

Abstract:

Online platforms as new business models play an important role in today’s economy and the functioning of the EU’s internal market. In the travel industry, algorithms used by online platforms for short-stay accommodation provide suggestions and price information to travelers. Those suggestions and recommendations are displayed in search results via recommendation (ranking) systems. There has been a growing consensus that the current legal framework was not sufficient to resolve problems arising from platform practices. In order to enhance the potential of the EU’s Single Market, smaller businesses should be protected, and their rights strengthened vis-à-vis large online platforms. The Regulation (EU) 2019/1150 of the European Parliament and of the Council on promoting fairness and transparency for business users of online intermediation services aims to level the playing field in that respect. This research looks at Airbnb through the lenses of this regulation. The research explores key determinants and finds that although regulation is an important step in the right direction, it is not enough. It does not entail sufficient clarity obligations that would make online platforms an intermediary service which both accommodation providers and travelers could use with ease.

Keywords: algorithm, online platforms, ranking, consumers, EU regulation

Procedia PDF Downloads 108
506 A Systematic Literature Review on Changing Customer Requirements for Sustainable Design over Time

Authors: Lara F. Horani

Abstract:

Design is one of the most important stages in the process of product development. Product design has experienced significant changes over the years ranging from concentrating on cost and performance to combining economic, environmental and social considerations in customer requirements. Its evolution is in accordance with rapidly changing technology, economic situations, and climate change and environmental issues, as well as social context. Within product design, sustainability is a concept that balances economic, social and environmental aspects. This research aims to express changes in customer requirements over time from the viewpoint of sustainable design. It does so by systematically reviewing a broad scope of sustainable design literature. There is a need for a model to consider the changes that take place in customer requirements over time to build a successful relationship with customers which has been presented. Today’s literature does very little to even mention it, let alone present any progress in it. Systematic literature reviews are conducted primarily to: summarize the existing literature around a subject, highlight commonalities to build consensus, illuminate differences, identify gaps that can be filled, provide a background to position future research, and build a framework that can help designers meet the challenges of sustainable design.

Keywords: sustainable design, customer requirements for sustainable design, systematic literature reviews, changing customer requirements

Procedia PDF Downloads 342
505 Heuristic Classification of Hydrophone Recordings

Authors: Daniel M. Wolff, Patricia Gray, Rafael de la Parra Venegas

Abstract:

An unsupervised machine listening system is constructed and applied to a dataset of 17,195 30-second marine hydrophone recordings. The system is then heuristically supplemented with anecdotal listening, contextual recording information, and supervised learning techniques to reduce the number of false positives. Features for classification are assembled by extracting the following data from each of the audio files: the spectral centroid, root-mean-squared values for each frequency band of a 10-octave filter bank, and mel-frequency cepstral coefficients in 5-second frames. In this way both time- and frequency-domain information are contained in the features to be passed to a clustering algorithm. Classification is performed using the k-means algorithm and then a k-nearest neighbors search. Different values of k are experimented with, in addition to different combinations of the available feature sets. Hypothesized class labels are 'primarily anthrophony' and 'primarily biophony', where the best class result conforming to the former label has 104 members after heuristic pruning. This demonstrates how a large audio dataset has been made more tractable with machine learning techniques, forming the foundation of a framework designed to acoustically monitor and gauge biological and anthropogenic activity in a marine environment.

Keywords: anthrophony, hydrophone, k-means, machine learning

Procedia PDF Downloads 137
504 Blockchain for IoT Security and Privacy in Healthcare Sector

Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab

Abstract:

The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.

Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data

Procedia PDF Downloads 147
503 The Role of State Practices and Custom in Outer Space Law

Authors: Biswanath Gupta, Raju Kd

Abstract:

Space law is the new entry in the basket of international law in the latter half of the 20th Century. In the last hundred and fifty years, courts and scholars developed a consensus that, the custom is an important source of international law. Article 38(1) (b) of the statute of the International Court of Justice recognized international custom as a source of international law. State practices and usages have a greater role to play in formulating customary international law. This paper examines those state practices which can be qualified to become international customary law. Since, 1979 (after Moon Treaty) no hard law have been developed in the area of space exploration. It tries to link between state practices and custom in space exploration and development of customary international law in space activities. The paper uses doctrinal method of legal research for examining the current questions of international law. The paper explores different international legal documents such as General Assembly Resolutions, Treaty principles, working papers of UN, cases relating to customary international law and writing of jurists relating to space law and customary international law. It is argued that, principles such as common heritage of mankind, non-military zone, sovereign equality, nuclear weapon free zone and protection of outer space environment, etc. developed state practices among the international community which can be qualified to become international customary law.

Keywords: customary international law, state practice, space law, treaty

Procedia PDF Downloads 317
502 A Novel Breast Cancer Detection Algorithm Using Point Region Growing Segmentation and Pseudo-Zernike Moments

Authors: Aileen F. Wang

Abstract:

Mammography has been one of the most reliable methods for early detection and diagnosis of breast cancer. However, mammography misses about 17% and up to 30% of breast cancers due to the subtle and unstable appearances of breast cancer in their early stages. Recent computer-aided diagnosis (CADx) technology using Zernike moments has improved detection accuracy. However, it has several drawbacks: it uses manual segmentation, Zernike moments are not robust, and it still has a relatively high false negative rate (FNR)–17.6%. This project will focus on the development of a novel breast cancer detection algorithm to automatically segment the breast mass and further reduce FNR. The algorithm consists of automatic segmentation of a single breast mass using Point Region Growing Segmentation, reconstruction of the segmented breast mass using Pseudo-Zernike moments, and classification of the breast mass using the root mean square (RMS). A comparative study among the various algorithms on the segmentation and reconstruction of breast masses was performed on randomly selected mammographic images. The results demonstrated that the newly developed algorithm is the best in terms of accuracy and cost effectiveness. More importantly, the new classifier RMS has the lowest FNR–6%.

Keywords: computer aided diagnosis, mammography, point region growing segmentation, pseudo-zernike moments, root mean square

Procedia PDF Downloads 427
501 Identify the Factors Affecting Employment and Prioritize in the Economic Sector Jobs of Increased Employment MADM approach of using SAW and TOPSIS and POSET: Ministry of Cooperatives, Do Varamin City Social Welfare

Authors: Mina Rahmani Pour

Abstract:

Negative consequences of unemployment are: increasing age at marriage, addiction, depression, drug trafficking, divorce, immigration, elite, frustration, delinquency, theft, murder, etc., has led to addressing the issue of employment by economic planners, public authorities, chief executive economic conditions in different countries and different time is important. All countries are faced with the problem of unemployment. By identifying the influential factors of occupational employment and employing strengths in the basic steps can be taken to reduce unemployment. In this study, the most significant factors affecting employment has identified 12 variables based on interviews conducted Choose Vtasyrafzaysh engaged in three main business is discussed. DRGAM next question the 8 expert ministry to respond to it is distributed and for weight Horns AZFN Shannon entropy and the ranking criteria of the (SAW, TOPSIS) used. According to the results of the above methods are not compatible with each other, to reach a general consensus on the rating criteria of the technique of integrating (POSET) involving average, Borda, copeland is used. Ultimately, there is no difference between the employments in the economic sector jobs of increased employment.

Keywords: employment, effective techniques, SAW, TOPSIS

Procedia PDF Downloads 209
500 Attention Based Fully Convolutional Neural Network for Simultaneous Detection and Segmentation of Optic Disc in Retinal Fundus Images

Authors: Sandip Sadhukhan, Arpita Sarkar, Debprasad Sinha, Goutam Kumar Ghorai, Gautam Sarkar, Ashis K. Dhara

Abstract:

Accurate segmentation of the optic disc is very important for computer-aided diagnosis of several ocular diseases such as glaucoma, diabetic retinopathy, and hypertensive retinopathy. The paper presents an accurate and fast optic disc detection and segmentation method using an attention based fully convolutional network. The network is trained from scratch using the fundus images of extended MESSIDOR database and the trained model is used for segmentation of optic disc. The false positives are removed based on morphological operation and shape features. The result is evaluated using three-fold cross-validation on six public fundus image databases such as DIARETDB0, DIARETDB1, DRIVE, AV-INSPIRE, CHASE DB1 and MESSIDOR. The attention based fully convolutional network is robust and effective for detection and segmentation of optic disc in the images affected by diabetic retinopathy and it outperforms existing techniques.

Keywords: attention-based fully convolutional network, optic disc detection and segmentation, retinal fundus image, screening of ocular diseases

Procedia PDF Downloads 112
499 Streamline Marketing Strategies for Survival of Librarianship in Developing Countries in the 21st Century: A Study Related to Sri Lanka

Authors: Wilfred Jeyatheese Jeyaraj

Abstract:

Considering the current digital age, Library Marketing, in its entirety, has evolved to elucidate the importance of falling back to the roots of searching for tangible and intangible resources, traversing through pages and references to acquire the required knowledge needs with proper guidance. With the turn of the century, the present generation has deeply entrenched their virtual presence, browsing via search engines for all their information needs. Not fully realizing the adverse effects of the materials available digitally, the authenticity of such resources cannot be verified. So a user might be led to believe false misdirected data. This paper tends to elucidate the prominent strategies to market Sri Lankan libraries in a proper manner so as to captivate a large user base making them aware that all resources and materials that they access without guidance outside the libraries are also available within the libraries with added guidance towards accessing the right data. The main contemplation here is to focus on getting more users to visit libraries in person to copiously apprehend the importance of browsing for materials with the proper direction. The current library marketing strategies in Sri Lankan libraries need to be streamlined to align with the best interest of acquiring the present generations to visit libraries in person to reap its benefits.

Keywords: accessibility, librarianship, marketing, Sri Lanka

Procedia PDF Downloads 253
498 Precise Identification of Clustered Regularly Interspaced Short Palindromic Repeats-Induced Mutations via Hidden Markov Model-Based Sequence Alignment

Authors: Jingyuan Hu, Zhandong Liu

Abstract:

CRISPR genome editing technology has transformed molecular biology by accurately targeting and altering an organism’s DNA. Despite the state-of-art precision of CRISPR genome editing, the imprecise mutation outcome and off-target effects present considerable risk, potentially leading to unintended genetic changes. Targeted deep sequencing, combined with bioinformatics sequence alignment, can detect such unwanted mutations. Nevertheless, the classical method, Needleman-Wunsch (NW) algorithm may produce false alignment outcomes, resulting in inaccurate mutation identification. The key to precisely identifying CRISPR-induced mutations lies in determining optimal parameters for the sequence alignment algorithm. Hidden Markov models (HMM) are ideally suited for this task, offering flexibility across CRISPR systems by leveraging forward-backward algorithms for parameter estimation. In this study, we introduce CRISPR-HMM, a statistical software to precisely call CRISPR-induced mutations. We demonstrate that the software significantly improves precision in identifying CRISPR-induced mutations compared to NW-based alignment, thereby enhancing the overall understanding of the CRISPR gene-editing process.

Keywords: CRISPR, HMM, sequence alignment, gene editing

Procedia PDF Downloads 23
497 From Arab Spring to Arabian Nightmare: State Failure and Identity in the Middle East

Authors: Kenneth Christie

Abstract:

Syria and Iraq are Arabian nightmares at the local, the regional and global levels in terms of human security and the protection of the vulnerable. Wracked by civil war, ethnic and political violence in the last 5 years in the case of Syria and 13 years in the case of Iraq, the body count now is staggering; the humanitarian crisis continues and there appears no end to this. A crisis that has claimed the lives of 200,000 people so far in Syria, sparked a humanitarian catastrophe fuelled violent Islamic extremism and exposed serious splits in the international community who appear to have no consensus. The international community’s failure to act is simply another sign of the desperate situation which has developed over conflicts that appears unsolvable in the immediate future and may be intractable in the long range. Three things are really at stake I’m going to argue in these continuing crises and how it will affect the human security dimensions of the conflict. Firstly, the protection of vulnerable individuals and civilians in the war, 2ndly, the dire consequences for regional instability as a result and thirdly the risks for minority and ethnic identities who are caught up in this, within and across these volatile borders. This paper will examine these elements and the consequences of the conflict in terms of human security, migration and development.

Keywords: human security, migration, Syria and Iraq, conflict and development

Procedia PDF Downloads 338
496 A Soft System Methodology Approach to Stakeholder Engagement in Water Sensitive Urban Design

Authors: Lina Lukusa, Ulrike Rivett

Abstract:

Poor water management can increase the extreme pressure already faced by water scarcity. Unless water management is addressed holistically, water quality and quantity will continue to degrade. A holistic approach to water management named Water Sensitive Urban Design (WSUD) has thus been created to facilitate the effective management of water. Traditionally, water management has employed a linear design approach, while WSUD requires a systematic, cyclical approach. In simple terms, WSUD assumes that everything is connected. Hence, it is critical for different stakeholders involved in WSUD to engage and reach a consensus on a solution. However, many stakeholders in WSUD have conflicting interests. Using the soft system methodology (SSM), developed by Peter Checkland, as a problem-solving method, decision-makers can understand this problematic situation from different world views. The SSM addresses ill and complex challenging situations involving human activities in a complex structured scenario. This paper demonstrates how SSM can be applied to understand the complexity of stakeholder engagement in WSUD. The paper concludes that SSM is an adequate solution to understand a complex problem better and then propose efficient solutions.

Keywords: co-design, ICT platform, soft systems methodology, water sensitive urban design

Procedia PDF Downloads 100
495 System for the Detecting of Fake Profiles on Online Social Networks Using Machine Learning and the Bio-Inspired Algorithms

Authors: Sekkal Nawel, Mahammed Nadir

Abstract:

The proliferation of online activities on Online Social Networks (OSNs) has captured significant user attention. However, this growth has been hindered by the emergence of fraudulent accounts that do not represent real individuals and violate privacy regulations within social network communities. Consequently, it is imperative to identify and remove these profiles to enhance the security of OSN users. In recent years, researchers have turned to machine learning (ML) to develop strategies and methods to tackle this issue. Numerous studies have been conducted in this field to compare various ML-based techniques. However, the existing literature still lacks a comprehensive examination, especially considering different OSN platforms. Additionally, the utilization of bio-inspired algorithms has been largely overlooked. Our study conducts an extensive comparison analysis of various fake profile detection techniques in online social networks. The results of our study indicate that supervised models, along with other machine learning techniques, as well as unsupervised models, are effective for detecting false profiles in social media. To achieve optimal results, we have incorporated six bio-inspired algorithms to enhance the performance of fake profile identification results.

Keywords: machine learning, bio-inspired algorithm, detection, fake profile, system, social network

Procedia PDF Downloads 42
494 The Theory of Domination at the Bane of Conflict Resolution and Peace Building Processes in Cameroon

Authors: Nkatow Mafany Christian

Abstract:

According to UNHCR’s annual Database, humanitarian crises have globally been on the increase since the beginning of the 21st Century, especially in the Middle East and in Sub-Saharan Africa. Cameroon is one of the countries that has suffered tremendously from humanitarian challenges in recent years, especially with crises in the Far North, the East and its Two English-speaking Regions. These have been a result of failed mechanisms in conflict resolution peacebuilding by the government. The paper draws from this basic premise to argue that the failure to reach a consensus in order to curb internal conflicts has largely been due to the government’s attachment to the domineering attitude which emphasizes an imposition of peace terms by a superordinate (government) agency on the subordinate (aggrieved) entities. This has stalled peace efforts that have so far been engaged to address the dreaded armed conflicts in the North and South West Regions, leading to the persistence of the armed conflict. The paper exploits written, oral and online sources to sustain its argument. It suggests that an eclectic approach to resolving conflicts, which emphasizes open and frank dialogue as well as a review of the root causes, can go a long way not only to build trust but also to address the Anglophone-Cameroonian problems in Cameroon.

Keywords: conflict, conflict resolution, peace building, humanitarian crisis

Procedia PDF Downloads 44
493 Kluyveromyces marxianus ABB S8 as Yeast-Based Technology to Manufacture Low FODMAP Baking Good

Authors: Jordi Cuñé, Carlos de Lecea, Laia Marti

Abstract:

Small molecules known as fermentable oligo-, di-, and monosaccharides and polyols (FODMAPs) are quickly fermented in the large intestine after being poorly absorbed in the small intestine. There is proof that individuals suffering from functional gastrointestinal disorders, like irritable bowel syndrome (IBS), observe an improvement while following a diet low in FODMAPs. Because wheat has a relatively high fructan content, it is a key source of FODMAPs in our diet. A yeast-based method was created in this study to lower the amounts of FODMAP in (whole wheat) bread. In contrast to fermentation by regular baker yeast, the combination of Kluyveromyces marxianus ABB S7 with Saccharomyces cerevisiae allowed a reduction of fructan content by 60% without implying the appearance of other substrates categorized as FODMAP (excess fructose or polyols). The final FODMAP content in the developed whole wheat bread would allow its classification as a safe product for sensitive people, according to international consensus. Cocultures of S. cerevisiae and K. marxianus were established in order to ensure sufficient CO₂ generation; larger quantities of gas were produced due to the strains' synergistic relationship. Thus, this method works well for lowering the levels of FODMAPs in bread.

Keywords: Kluyveromyces marxianus, bakery, bread, FODMAP, IBS, functional gastro intestinal disorders

Procedia PDF Downloads 29
492 Offline Signature Verification Using Minutiae and Curvature Orientation

Authors: Khaled Nagaty, Heba Nagaty, Gerard McKee

Abstract:

A signature is a behavioral biometric that is used for authenticating users in most financial and legal transactions. Signatures can be easily forged by skilled forgers. Therefore, it is essential to verify whether a signature is genuine or forged. The aim of any signature verification algorithm is to accommodate the differences between signatures of the same person and increase the ability to discriminate between signatures of different persons. This work presented in this paper proposes an automatic signature verification system to indicate whether a signature is genuine or not. The system comprises four phases: (1) The pre-processing phase in which image scaling, binarization, image rotation, dilation, thinning, and connecting ridge breaks are applied. (2) The feature extraction phase in which global and local features are extracted. The local features are minutiae points, curvature orientation, and curve plateau. The global features are signature area, signature aspect ratio, and Hu moments. (3) The post-processing phase, in which false minutiae are removed. (4) The classification phase in which features are enhanced before feeding it into the classifier. k-nearest neighbors and support vector machines are used. The classifier was trained on a benchmark dataset to compare the performance of the proposed offline signature verification system against the state-of-the-art. The accuracy of the proposed system is 92.3%.

Keywords: signature, ridge breaks, minutiae, orientation

Procedia PDF Downloads 124
491 A Web Application for Screening Dyslexia in Greek Students

Authors: Antonios Panagopoulos, Stamoulis Georgios

Abstract:

Dyslexia's diagnosis is made taking into account reading and writing skills and is carried out by qualified scientific staff. In addition, there are screening tests that are designed to give an indication of possible dyslexic difficulties. Their main advantage is that they create a pleasant environment for the user and reduce the stress that can lead to false results. An online application was created for the first time, as far as authors' knowledge, for screening Dyslexia in Greek high school students named «DyScreTe». Thus, a sample of 240 students between 16 and 18 years old in Greece was taken, of which 120 were diagnosed with dyslexia by an official authority in Greece, and 120 were typically developed. The main hypothesis that was examined is that students who were diagnosed with dyslexia by official authorities in Greece had significantly lower performance in the respective software tests. The results verified the hypothesis we made those children with dyslexia in each test had a lower performance com-pared to the type developed in successful responses, except for the intelligence test. After random sampling, it was shown that the new online application was a useful tool for screening dyslexia. However, computer evaluation cannot replace the diagnosis by a professional expert, but with the results of this application, the interdisciplinary team that deals with the differential diagnosis will create and evaluate, at a later time, the appropriate intervention program.

Keywords: dyslexia, screening tests, deficits, application

Procedia PDF Downloads 56
490 The Transformation of Architecture through the Technological Developments in History: Future Architecture Scenario

Authors: Adel Gurel, Ozge Ceylin Yildirim

Abstract:

Nowadays, design and architecture are being affected and underwent change with the rapid advancements in technology, economics, politics, society and culture. Architecture has been transforming with the latest developments after the inclusion of computers into design. Integration of design into the computational environment has revolutionized the architecture and new perspectives in architecture have been gained. The history of architecture shows the various technological developments and changes in which the architecture has transformed with time. Therefore, the analysis of integration between technology and the history of the architectural process makes it possible to build a consensus on the idea of how architecture is to proceed. In this study, each period that occurs with the integration of technology into architecture is addressed within historical process. At the same time, changes in architecture via technology are identified as important milestones and predictions with regards to the future of architecture have been determined. Developments and changes in technology and the use of technology in architecture within years are analyzed in charts and graphs comparatively. The historical process of architecture and its transformation via technology are supported with detailed literature review and they are consolidated with the examination of focal points of 20th-century architecture under the titles; parametric design, genetic architecture, simulation, and biomimicry. It is concluded that with the historical research between past and present; the developments in architecture cannot keep up with the advancements in technology and recent developments in technology overshadow the architecture, even the technology decides the direction of architecture. As a result, a scenario is presented with regards to the reach of technology in the future of architecture and the role of the architect.

Keywords: computer technologies, future architecture, scientific developments, transformation

Procedia PDF Downloads 168
489 The Optimal Location of Brickforce in Brickwork

Authors: Sandile Daniel Ngidi

Abstract:

A brickforce is a product consisting of two main parallel wires joined by in-line welded cross wires. Embedded in the normal thickness of the brickwork joint, the wires are manufactured to a flattened profile to simplify location into the mortar joint without steel build-up problems at lap positions corners/junctions or when used in conjunction with wall ties. A brickforce has been in continuous use since 1918. It is placed in the cement between courses of bricks. Brickforce is used in every course of the foundations and every course above lintel height. Otherwise, brickforce is used every fourth course in between the foundations and lintel height or a concrete slab and lintel height. The brickforce strengthens and stabilizes the wall, especially if you are building on unstable ground. It provides brickwork increased resistance to tensional stresses. Brickforce uses high tensile steel wires, which can withstand high forces but with a very little stretch. This helps to keep crack widths to a minimum. Recently a debate has opened about the purpose of using brickforce in single-story buildings. The debate has been compounded by the fact that there is no consensus about the spacing of brickforce in brickwork or masonry. In addition, very little information had been published on the relative merits of using the same size of brickforce for the different atmospheric conditions in South Africa. This paper aims to compare different types of brickforce systems used in different countries. Conclusions are made to identify the point and location of brickforce that optimize the system.

Keywords: brickforce, masonry concrete, reinforcement, strengthening, wall panels

Procedia PDF Downloads 207
488 Application of Simulated Annealing to Threshold Optimization in Distributed OS-CFAR System

Authors: L. Abdou, O. Taibaoui, A. Moumen, A. Talib Ahmed

Abstract:

This paper proposes an application of the simulated annealing to optimize the detection threshold in an ordered statistics constant false alarm rate (OS-CFAR) system. Using conventional optimization methods, such as the conjugate gradient, can lead to a local optimum and lose the global optimum. Also for a system with a number of sensors that is greater than or equal to three, it is difficult or impossible to find this optimum; Hence, the need to use other methods, such as meta-heuristics. From a variety of meta-heuristic techniques, we can find the simulated annealing (SA) method, inspired from a process used in metallurgy. This technique is based on the selection of an initial solution and the generation of a near solution randomly, in order to improve the criterion to optimize. In this work, two parameters will be subject to such optimisation and which are the statistical order (k) and the scaling factor (T). Two fusion rules; “AND” and “OR” were considered in the case where the signals are independent from sensor to sensor. The results showed that the application of the proposed method to the problem of optimisation in a distributed system is efficiency to resolve such problems. The advantage of this method is that it allows to browse the entire solutions space and to avoid theoretically the stagnation of the optimization process in an area of local minimum.

Keywords: distributed system, OS-CFAR system, independent sensors, simulating annealing

Procedia PDF Downloads 481
487 Energy Detection Based Sensing and Primary User Traffic Classification for Cognitive Radio

Authors: Urvee B. Trivedi, U. D. Dalal

Abstract:

As wireless communication services grow quickly; the seriousness of spectrum utilization has been on the rise gradually. An emerging technology, cognitive radio has come out to solve today’s spectrum scarcity problem. To support the spectrum reuse functionality, secondary users are required to sense the radio frequency environment, and once the primary users are found to be active, the secondary users are required to vacate the channel within a certain amount of time. Therefore, spectrum sensing is of significant importance. Once sensing is done, different prediction rules apply to classify the traffic pattern of primary user. Primary user follows two types of traffic patterns: periodic and stochastic ON-OFF patterns. A cognitive radio can learn the patterns in different channels over time. Two types of classification methods are discussed in this paper, by considering edge detection and by using autocorrelation function. Edge detection method has a high accuracy but it cannot tolerate sensing errors. Autocorrelation-based classification is applicable in the real environment as it can tolerate some amount of sensing errors.

Keywords: cognitive radio (CR), probability of detection (PD), probability of false alarm (PF), primary user (PU), secondary user (SU), fast Fourier transform (FFT), signal to noise ratio (SNR)

Procedia PDF Downloads 328
486 Numerical Modeling to Validate Theoretical Models of Toppling Failure in Rock Slopes

Authors: Hooman Dabirmanesh, Attila M. Zsaki

Abstract:

Traditionally, rock slope stability is carried out using limit equilibrium analysis when investigating toppling failure. In these equilibrium methods, internal forces exerted between columns are not clearly defined, and to the authors’ best knowledge, there is no consensus in literature with respect to the results of analysis. A discrete element method-based numerical model was developed and applied to simulate the behavior of rock layers subjected to toppling failure. Based on this calibrated numerical model, a study of the location and distribution of internal forces that result in equilibrium was carried out. The sum of side forces was applied at a point on a block which properly represents the force to determine the inter-column force distribution. In terms of the side force distribution coefficient, the result was compared to those obtained from laboratory centrifuge tests. The results of the simulation show the suitable criteria to select the correct position for the internal exerted force between rock layers. In addition, the numerical method demonstrates how a theoretical method could be reliable by considering the interaction between the rock layers.

Keywords: contact bond, discrete element, force distribution, limit equilibrium, tensile stress

Procedia PDF Downloads 122
485 Application of Hyperbinomial Distribution in Developing a Modified p-Chart

Authors: Shourav Ahmed, M. Gulam Kibria, Kais Zaman

Abstract:

Control charts graphically verify variation in quality parameters. Attribute type control charts deal with quality parameters that can only hold two states, e.g., good or bad, yes or no, etc. At present, p-control chart is most commonly used to deal with attribute type data. In construction of p-control chart using binomial distribution, the value of proportion non-conforming must be known or estimated from limited sample information. As the probability distribution of fraction non-conforming (p) is considered in hyperbinomial distribution unlike a constant value in case of binomial distribution, it reduces the risk of false detection. In this study, a statistical control chart is proposed based on hyperbinomial distribution when prior estimate of proportion non-conforming is unavailable and is estimated from limited sample information. We developed the control limits of the proposed modified p-chart using the mean and variance of hyperbinomial distribution. The proposed modified p-chart can also utilize additional sample information when they are available. The study also validates the use of modified p-chart by comparing with the result obtained using cumulative distribution function of hyperbinomial distribution. The study clearly indicates that the use of hyperbinomial distribution in construction of p-control chart yields much accurate estimate of quality parameters than using binomial distribution.

Keywords: binomial distribution, control charts, cumulative distribution function, hyper binomial distribution

Procedia PDF Downloads 246