Search results for: mobile Ad Hoc networks
982 From Electroencephalogram to Epileptic Seizures Detection by Using Artificial Neural Networks
Authors: Gaetano Zazzaro, Angelo Martone, Roberto V. Montaquila, Luigi Pavone
Abstract:
Seizure is the main factor that affects the quality of life of epileptic patients. The diagnosis of epilepsy, and hence the identification of epileptogenic zone, is commonly made by using continuous Electroencephalogram (EEG) signal monitoring. Seizure identification on EEG signals is made manually by epileptologists and this process is usually very long and error prone. The aim of this paper is to describe an automated method able to detect seizures in EEG signals, using knowledge discovery in database process and data mining methods and algorithms, which can support physicians during the seizure detection process. Our detection method is based on Artificial Neural Network classifier, trained by applying the multilayer perceptron algorithm, and by using a software application, called Training Builder that has been developed for the massive extraction of features from EEG signals. This tool is able to cover all the data preparation steps ranging from signal processing to data analysis techniques, including the sliding window paradigm, the dimensionality reduction algorithms, information theory, and feature selection measures. The final model shows excellent performances, reaching an accuracy of over 99% during tests on data of a single patient retrieved from a publicly available EEG dataset.Keywords: artificial neural network, data mining, electroencephalogram, epilepsy, feature extraction, seizure detection, signal processing
Procedia PDF Downloads 188981 Use of Information and Communication Technologies in Enhancing Health Care Delivery for Human Immunodeficiency Virus Patients in Bamenda Health District
Authors: Abanda Wilfred Chick
Abstract:
Background: According to World Health Organization (WHO), the role of Information and Communication Technologies (ICT) in health sectors of developing nations has been demonstrated to have had a great improvement of fifty percent reduction in mortality and or twenty-five-fifty percent increase in productivity. The objective of this study was to assess the use of information and communication technologies in enhancing health care delivery for Human Immunodeficiency Virus (HIV) patients in Bamenda Health District. Methods: This was a descriptive-analytical cross-sectional study in which 388 participants were consecutively selected amongst health personnel and HIV patients from public and private health institutions involved in Human Immunodeficiency Virus management. Data on socio-demographic variables, the use of information and communication technologies tools, and associated challenges were collected using structured questionnaires. Descriptive statistics with a ninety-five percent confidence interval were used to summarize findings, while Cramer’s V test, logistic regression, and Chi-square test were used to measure the association between variables, Epi info version7.2, MS Excel, and SPSS version 25.0 were utilized for data entry and statistical analysis respectively. Results: Of the participants, one-quarter were health personnel, and three-quarters were HIV patients. For both groups of participants, there was a significant relationship between the use of ICT and demographic information such as level of education, marital status, and age (p<0.05). For the impediments to using ICT tools, a greater proportion identified the high cost of airtime or internet bundles, followed by an average proportion that indicated inadequate training on ICT tools; for health personnel, the majority said inadequate training on ICT tools/applications and half said unavailability of electricity. Conclusion: Not up to half of the HIV patients effectively make use of ICT tools/applications to receive health care. Of health personnel, three quarters use ICTs, and only one quarter effectively use mobile phones and one-third of computers, respectively, to render care to HIV patients.Keywords: ICT tools, HIV patients, health personnel, health care delivery
Procedia PDF Downloads 84980 Effectiveness of Opuntia ficus indica Cladodes Extract for Wound-Healing
Authors: Giuffrida Graziella, Pennisi Stefania, Coppa Federica, Iannello Giulia, Cartelli Simone, Lo Faro Riccardo, Ferruggia Greta, Brundo Maria Violetta
Abstract:
Cladode chemical composition may vary according to soil factors, cultivation season, and plant age. The primary metabolites of cladodes are water, carbohydrates, and proteins. The carbohydrates in cladodes are divided into two types: structural and storage. Polysaccharides from Opuntia ficus‐indica (L.) Mill plants build molecular networks with the capacity to retain water; thus, they act as mucoprotective agents. Mucilage is the main polysaccharide of cladodes; it contains polymers of β‐d‐galacturonic acid bound in positions (1–4) and traces of R‐linked l‐rhamnose (1-2). Mucilage regulates both the cell water content during prolonged drought and the calcium flux in the plant cells. The in vitro analysis of keratinocytes in monolayer, through the scratch-wound-healing assay, provided promising results. After 48 hours of exposure, the wound scratch was almost completely closed in cells treated with cladode extract. After 72 hours, the treated cells reached complete confluence, while in the untreated cells (negative control) the confluence was reached after 96 hours. We also added a positive control group of cells treated with colchicine, which inhibited wound closure for a more comprehensive analysis.Keywords: cladodes, metabolites, polysaccharide, scratch-wound-healing assay
Procedia PDF Downloads 54979 Assessing Livelihood Vulnerability to Climate Change and Adaptation Strategies in Rajanpur District, Pakistan
Authors: Muhammad Afzal, Shahbaz Mushtaq, Duc-Anh-An-Vo, Kathryn Reardon Smith, Thanh Ma
Abstract:
Climate change has become one of the most challenging environmental issues in the 21st century. Climate change-induced natural disasters, especially floods, are the major factors of livelihood vulnerability, impacting millions of individuals worldwide. Evaluating and mitigating the effects of floods requires an in-depth understanding of the relationship between vulnerability and livelihood capital assets. Using an integrated approach, sustainable livelihood framework, and system thinking approach, the study developed a conceptual model of a generalized livelihood system in District Rajanpur, Pakistan. The model visualizes the livelihood vulnerability system as a whole and identifies the key feedback loops likely to influence the livelihood vulnerability. The study suggests that such conceptual models provide effective communication and understanding tools to stakeholders and decision-makers to anticipate the problem and design appropriate policies. It can also serve as an evaluation technique for rural livelihood policy and identify key systematic interventions. The key finding of the study reveals that household income, health, and education are the major factors behind the livelihood vulnerability of the rural poor of District Rajanpur. The Pakistani government tried to reduce the livelihood vulnerability of the region through different income, health, and education programs, but still, many changes are required to make these programs more effective especially during the flood times. The government provided only cash to vulnerable and marginalized families through income support programs, but this study suggests that along with the cash, the government must provide seed storage facilities and access to crop insurance to the farmers. Similarly, the government should establish basic health units in villages and frequent visits of medical mobile vans should be arranged with advanced medical lab facilities during and after the flood.Keywords: livelihood vulnerability, rural communities, flood, sustainable livelihood framework, system dynamics, Pakistan
Procedia PDF Downloads 50978 Reduce the Impact of Wildfires by Identifying Them Early from Space and Sending Location Directly to Closest First Responders
Authors: Gregory Sullivan
Abstract:
The evolution of global warming has escalated the number and complexity of forest fires around the world. As an example, the United States and Brazil combined generated more than 30,000 forest fires last year. The impact to our environment, structures and individuals is incalculable. The world has learned to try to take this in stride, trying multiple ways to contain fires. Some countries are trying to use cameras in limited areas. There are discussions of using hundreds of low earth orbit satellites and linking them together, and, interfacing them through ground networks. These are all truly noble attempts to defeat the forest fire phenomenon. But there is a better, simpler answer. A bigger piece of the solutions puzzle is to see the fires while they are small, soon after initiation. The approach is to see the fires while they are very small and report their location (latitude and longitude) to local first responders. This is done by placing a sensor at geostationary orbit (GEO: 26,000 miles above the earth). By placing this small satellite in GEO, we can “stare” at the earth, and sense temperature changes. We do not “see” fires, but “measure” temperature changes. This has already been demonstrated on an experimental scale. Fires were seen at close to initiation, and info forwarded to first responders. it were the first to identify the fires 7 out of 8 times. The goal is to have a small independent satellite at GEO orbit focused only on forest fire initiation. Thus, with one small satellite, focused only on forest fire initiation, we hope to greatly decrease the impact to persons, property and the environment.Keywords: space detection, wildfire early warning, demonstration wildfire detection and action from space, space detection to first responders
Procedia PDF Downloads 70977 Progress in Replacing Antibiotics in Farm Animal Production
Authors: Debabrata Biswas
Abstract:
The current trend in the development of antibiotic resistance by multiple bacterial pathogens has resulted in a troubling loss of effective antibiotic options for human. The emergence of multi-drug-resistant pathogens has necessitated higher dosages and combinations of multiple antibiotics, further exacerbating the problem of antibiotic resistance. Zoonotic bacterial pathogens, such as Salmonella, Campylobacter, Shiga toxin-producing Escherichia coli (such as enterohaemorrhagic E. coli or EHEC), and Listeria are the most common and predominant foodborne enteric infectious agents. It was observed that these pathogens gained/developed their ability to survive in the presence of antibiotics either in farm animal gut or farm environment and researchers believe that therapeutic and sub-therapeutic antibiotic use in farm animal production might play an important role in it. The mechanism of action of antimicrobial components used in farm animal production in genomic interplay in the gut and farm environment, has not been fully characterized. Even the risk of promoting the exchange of mobile genetic elements between microbes specifically pathogens needs to be evaluated in depth, to ensure sustainable farm animal production, safety of our food and to mitigate/limit the enteric infection with multiple antibiotic resistant bacterial pathogens. Due to the consumer’s demand and considering the current emerging situation, many countries are in process to withdraw antibiotic use in farm animal production. Before withdrawing use of the sub-therapeutic antibiotic or restricting the use of therapeutic antibiotics in farm animal production, it is essential to find alternative natural antimicrobials for promoting the growth of farm animal and/or treating animal diseases. Further, it is also necessary to consider whether that compound(s) has the potential to trigger the acquisition or loss of genetic materials in zoonotic and any other bacterial pathogens. Development of alternative therapeutic and sub-therapeutic antimicrobials for farm animal production and food processing and preservation and their effective implementation for sustainable strategies for farm animal production as well as the possible risk for horizontal gene transfer in major enteric pathogens will be focus in the study.Keywords: food safety, natural antimicrobial, sustainable farming, antibiotic resistance
Procedia PDF Downloads 270976 The Use of Layered Neural Networks for Classifying Hierarchical Scientific Fields of Study
Authors: Colin Smith, Linsey S Passarella
Abstract:
Due to the proliferation and decentralized nature of academic publication, no widely accepted scheme exists for organizing papers by their scientific field of study (FoS) to the author’s best knowledge. While many academic journals require author provided keywords for papers, these keywords range wildly in scope and are not consistent across papers, journals, or field domains, necessitating alternative approaches to paper classification. Past attempts to perform field-of-study (FoS) classification on scientific texts have largely used a-hierarchical FoS schemas or ignored the schema’s inherently hierarchical structure, e.g. by compressing the structure into a single layer for multi-label classification. In this paper, we introduce an application of a Layered Neural Network (LNN) to the problem of performing supervised hierarchical classification of scientific fields of study (FoS) on research papers. In this approach, paper embeddings from a pretrained language model are fed into a top-down LNN. Beginning with a single neural network (NN) for the highest layer of the class hierarchy, each node uses a separate local NN to classify the subsequent subfield child node(s) for an input embedding of concatenated paper titles and abstracts. We compare our LNN-FOS method to other recent machine learning methods using the Microsoft Academic Graph (MAG) FoS hierarchy and find that the LNN-FOS offers increased classification accuracy at each FoS hierarchical level.Keywords: hierarchical classification, layer neural network, scientific field of study, scientific taxonomy
Procedia PDF Downloads 133975 Study of the Adsorptives Properties of Zeolites X Exchanged by the Cations Cu2 + and/or Zn2+
Authors: H. Hammoudi, S. Bendenia, I. Batonneau-Gener, A. Khelifa
Abstract:
Applying growing zeolites is due to their intrinsic physicochemical properties: a porous structure, regular, generating a large free volume, a high specific surface area, acidic properties of interest to the origin of their activity, selectivity energy and dimensional, leading to a screening phenomenon, hence the name of molecular sieves is generally attributed to them. Most of the special properties of zeolites have been valued as direct applications such as ion exchange, adsorption, separation and catalysis. Due to their crystalline structure stable, their large pore volume and their high content of cation X zeolites are widely used in the process of adsorption and separation. The acidic properties of zeolites X and interesting selectivity conferred on them their porous structure is also have potential catalysts. The study presented in this manuscript is devoted to the chemical modification of an X zeolite by cation exchange. Ion exchange of zeolite NaX by Zn 2 + cations and / or Cu 2 + is gradually conducted by following the evolution of some of its characteristics: crystallinity by XRD, micropore volume by nitrogen adsorption. Once characterized, the different samples will be used for the adsorption of propane and propylene. Particular attention is paid thereafter, on the modeling of adsorption isotherms. In this vein, various equations of adsorption isotherms and localized mobile, some taking into account the adsorbate-adsorbate interactions, are used to describe the experimental isotherms. We also used the Toth equation, a mathematical model with three parameters whose adjustment requires nonlinear regression. The last part is dedicated to the study of acid properties of Cu (x) X, Zn (x) X and CuZn (x) X, with the adsorption-desorption of pyridine followed by IR. The effect of substitution at different rates of Na + by Cu2 + cations and / or Zn 2 +, on the crystallinity and on the textural properties was treated. Some results on the morphology of the crystallites and the thermal effects during a temperature rise, obtained by scanning electron microscopy and DTA-TGA thermal analyzer, respectively, are also reported. The acidity of our different samples was also studied. Thus, the nature and strength of each type of acidity are estimated. The evaluation of these various features will provide a comparison between Cu (x) X, Zn (x) X and CuZn (x) X. One study on adsorption of C3H8 and C3H6 in NaX, Cu (x) X , Zn (x) x and CuZn (x) x has been undertaken.Keywords: adsorption, acidity, ion exchange, zeolite
Procedia PDF Downloads 197974 Resilience of Infrastructure Networks: Maintenance of Bridges in Mountainous Environments
Authors: Lorenza Abbracciavento, Valerio De Biagi
Abstract:
Infrastructures are key elements to ensure the operational functionality of the transport system. The collapse of a single bridge or, equivalently, a tunnel can leads an entire motorway to be considered completely inaccessible. As a consequence, the paralysis of the communications network determines several important drawbacks for the community. Recent chronicle events have demonstrated that ensuring the functional continuity of the strategic infrastructures during and after a catastrophic event makes a significant difference in terms of life and economical losses. Moreover, it has been observed that RC structures located in mountain environments show a worst state of conservation compared to the same typology and aging structures located in temperate climates. Because of its morphology, in fact, the mountain environment is particularly exposed to severe collapse and deterioration phenomena, generally: natural hazards, e.g. rock falls, and meteorological hazards, e.g. freeze-thaw cycles or heavy snows. For these reasons, deep investigation on the characteristics of these processes becomes of fundamental importance to provide smart and sustainable solutions and make the infrastructure system more resilient. In this paper, the design of a monitoring system in mountainous environments is presented and analyzed in its parts. The method not only takes into account the peculiar climatic conditions, but it is integrated and interacts with the environment surrounding.Keywords: structural health monitoring, resilience of bridges, mountain infrastructures, infrastructural network, maintenance
Procedia PDF Downloads 77973 The Social Justice of Movement: Undocumented Immigrant Coalitions in the United States
Authors: Libia Jiménez Chávez
Abstract:
This is a study of freedom riders and their courageous journey for civil rights, but the year was not 1961. It was 2003. This paper chronicles the emergence of a new civil rights movement for immigrant rights through an oral history of the 2003 U.S. Immigrant Workers Freedom Ride (IWFR). During the height of the post-9/11 immigrant repression, a bloc of organizations inspired by the Civil Rights Movement of the 1960s mobilized 900 multinational immigrants and their allies in the fight for legal status, labor protections, family reunification, and civil rights. The activists visited over 100 U.S. cities, met with Congressional leaders in the nation’s capital, and led a rally of over 50,000 people in New York City. This unified effort set the groundwork for the national May Day immigration protests of 2006. Movements can be characterized in two distinct ways: physical movement and social movements. In the past, historians have considered immigrants both as people and as participants in social movements. In contrast, studies of recent migrants tend to say little about their involvement in immigrant political mobilizations. The dominant literature on immigration portrays immigrants as objects of exclusion, border enforcement, detention, and deportation instead of strategic political actors. This paper aims to change this perception. It considers the Freedom Riders both as immigrants who were literally on the move and as participants in a social movement. Through interviews with participants and archival video footage housed at the University of California Los Angeles, it is possible to study this mobile protest as a movement. This contemporary immigrant struggle is an opportunity to explore the makeup and development of a heterogenous immigrant coalition and consider the relationship between population movements and social justice. In addition to oral histories and archival research, the study will utilize social movement literature, U.S. immigration and labor history, and Undocumented Critical Theory to expand the historiography of immigrant social movements in America.Keywords: civil rights, immigrant social movements, undocumented communities, undocumented critical theory
Procedia PDF Downloads 171972 Elaboration and Physico-Chemical Characterization of Edible Films Made from Chitosan and Spray Dried Ethanolic Extracts of Propolis
Authors: David Guillermo Piedrahita Marquez, Hector Suarez Mahecha, Jairo Humberto Lopez
Abstract:
It was necessary to establish which formulation is suitable for the preservation of aquaculture products, that why edible films were made. These were to a characterization in order to meet their morphology physicochemical and mechanical properties, optical. Six Formulations of chitosan and propolis ethanolic extract encapsulated were developed because of their activity against pathogens and due to their properties, which allows the creation waterproof polymer networks against gasses, vapor, and physical damage. In the six Formulations, the concentration of comparison material (1% w/v, 2% pv) and the bioactive concentrations (0.5% w/v, 1% w/v, 1.5% pv) were changed and the results obtained were compared with statistical and multivariate analysis methods. It was observed that the matrices showed a mayor impermeability and thickness control samples and the samples reported in the literature. Also, these films showed a notorious uniformity of the films and a bigger resistance to the physical damage compared with other edible films made of other biopolymers. However the action of some compounds had a negative effect on the mechanical properties and changed drastically the optical properties, the bioactive has an effect on Polymer Matrix and it was determined that the films with 2% w / v of chitosan and 1.5% w/v encapsulated, exhibited the best properties and suffered to a lesser extent the negative impact of immiscible substances.Keywords: chitosan, edible films, ethanolic extract of propolis, mechanical properties, optical properties, physical characterization, scanning electron microscopy (SEM)
Procedia PDF Downloads 446971 Summer STEM Institute in Environmental Science and Data Sciencefor Middle and High School Students at Pace University
Authors: Lauren B. Birney
Abstract:
Summer STEM Institute for Middle and High School Students at Pace University The STEM Collaboratory NYC® Summer Fellows Institute takes place on Pace University’s New York City campus during July and provides the following key features for all participants: (i) individual meetings with Pace faculty to discuss and refine future educational goals; (ii) mentorship, guidance, and new friendships with program leaders; and (iii) guest lectures from professionals in STEM disciplines and businesses. The Summer STEM Institute allows middle school and high school students to work in teams to conceptualize, develop, and build native mobile applications that teach and reinforce skills in the sciences and mathematics. These workshops enhance students’STEM problem solving techniques and teach advanced methods of computer science and engineering. Topics include: big data and analytics at the Big Data lab at Seidenberg, Data Science focused on social and environmental advancement and betterment; Natural Disasters and their Societal Influences; Algal Blooms and Environmental Impacts; Green CitiesNYC; STEM jobs and growth opportunities for the future; renew able energy and sustainable infrastructure; and climate and the economy. In order to better align the existing Summer STEM, Institute with the CCERS model and expand the overall network, Pace is actively recruiting new content area specialists from STEM industries and private sector enterprises to participate in an enhanced summer institute in order to1) nurture student progress and connect summer learning to school year curriculum, 2) increase peer-to-peer collaboration amongst STEM professionals and private sector technologists, and 3) develop long term funding and sponsorship opportunities for corporate sector partners to support CCERS schools and programs directly.Keywords: environmental restoration science, citizen science, data science, STEM
Procedia PDF Downloads 85970 Digitalize or Die-Responsible Innovations in Healthcare and Welfare Sectors
Authors: T. Iakovleva
Abstract:
Present paper suggests a theoretical model that describes the process of the development of responsible innovations on the firm level in health and welfare sectors. There is a need to develop new firm strategies in these sectors. This paper suggests to look on the concept of responsible innovation that was originally developed on the social level and to apply this new concept to the new area of firm strategy. The rapid global diffusion of information and communication technologies has greatly improved access to knowledge. At the same time, communication is cheap, information is a commodity, and global trade increases technological diffusion. As a result, firms and users, including those outside of industrialized nations, get early exposure to the latest technologies and information. General-purpose technologies such as mobile phones and 3D printers enable individuals to solve local needs and customize products. The combined effect of these changes is having a profound impact on the innovation landscape. Meanwhile, the healthcare sector is facing unprecedented challenges, which are magnified by budgetary constraints, an aging population and the desire to provide care for all. On the other hand, patients themselves are changing. They are savvier about their diseases, they expect their relation with the healthcare professionals to be open and interactive, but above all they want to be part of the decision process. All of this is a reflection of what is already happening in other industries where customers have access to large amount of information and became educated buyers. This article addresses the question of how ICT research and innovation may contribute to developing solutions to grand societal challenges in a responsible way. A broad definition of the concept of responsibility in the context of innovation is adopted in this paper. Responsibility is thus seen as a collective, uncertain and future-oriented activity. This opens the questions of how responsibilities are perceived and distributed and how innovation and science can be governed and stewarded towards socially desirable and acceptable ends. This article addresses a central question confronting politicians, business leaders, and regional planners.Keywords: responsible innovation, ICT, healthcare, welfare sector
Procedia PDF Downloads 197969 An Efficient Subcarrier Scheduling Algorithm for Downlink OFDMA-Based Wireless Broadband Networks
Authors: Hassen Hamouda, Mohamed Ouwais Kabaou, Med Salim Bouhlel
Abstract:
The growth of wireless technology made opportunistic scheduling a widespread theme in recent research. Providing high system throughput without reducing fairness allocation is becoming a very challenging task. A suitable policy for resource allocation among users is of crucial importance. This study focuses on scheduling multiple streaming flows on the downlink of a WiMAX system based on orthogonal frequency division multiple access (OFDMA). In this paper, we take the first step in formulating and analyzing this problem scrupulously. As a result, we proposed a new scheduling scheme based on Round Robin (RR) Algorithm. Because of its non-opportunistic process, RR does not take in account radio conditions and consequently it affect both system throughput and multi-users diversity. Our contribution called MORRA (Modified Round Robin Opportunistic Algorithm) consists to propose a solution to this issue. MORRA not only exploits the concept of opportunistic scheduler but also takes into account other parameters in the allocation process. The first parameter is called courtesy coefficient (CC) and the second is called Buffer Occupancy (BO). Performance evaluation shows that this well-balanced scheme outperforms both RR and MaxSNR schedulers and demonstrate that choosing between system throughput and fairness is not required.Keywords: OFDMA, opportunistic scheduling, fairness hierarchy, courtesy coefficient, buffer occupancy
Procedia PDF Downloads 300968 A Non-Destructive Estimation Method for Internal Time in Perilla Leaf Using Hyperspectral Data
Authors: Shogo Nagano, Yusuke Tanigaki, Hirokazu Fukuda
Abstract:
Vegetables harvested early in the morning or late in the afternoon are valued in plant production, and so the time of harvest is important. The biological functions known as circadian clocks have a significant effect on this harvest timing. The purpose of this study was to non-destructively estimate the circadian clock and so construct a method for determining a suitable harvest time. We took eight samples of green busil (Perilla frutescens var. crispa) every 4 hours, six times for 1 day and analyzed all samples at the same time. A hyperspectral camera was used to collect spectrum intensities at 141 different wavelengths (350–1050 nm). Calculation of correlations between spectrum intensity of each wavelength and harvest time suggested the suitability of the hyperspectral camera for non-destructive estimation. However, even the highest correlated wavelength had a weak correlation, so we used machine learning to raise the accuracy of estimation and constructed a machine learning model to estimate the internal time of the circadian clock. Artificial neural networks (ANN) were used for machine learning because this is an effective analysis method for large amounts of data. Using the estimation model resulted in an error between estimated and real times of 3 min. The estimations were made in less than 2 hours. Thus, we successfully demonstrated this method of non-destructively estimating internal time.Keywords: artificial neural network (ANN), circadian clock, green busil, hyperspectral camera, non-destructive evaluation
Procedia PDF Downloads 299967 Ontology Expansion via Synthetic Dataset Generation and Transformer-Based Concept Extraction
Authors: Andrey Khalov
Abstract:
The rapid proliferation of unstructured data in IT infrastructure management demands innovative approaches for extracting actionable knowledge. This paper presents a framework for ontology-based knowledge extraction that combines relational graph neural networks (R-GNN) with large language models (LLMs). The proposed method leverages the DOLCE framework as the foundational ontology, extending it with concepts from ITSMO for domain-specific applications in IT service management and outsourcing. A key component of this research is the use of transformer-based models, such as DeBERTa-v3-large, for automatic entity and relationship extraction from unstructured texts. Furthermore, the paper explores how transfer learning techniques can be applied to fine-tune large language models (LLaMA) for using to generate synthetic datasets to improve precision in BERT-based entity recognition and ontology alignment. The resulting IT Ontology (ITO) serves as a comprehensive knowledge base that integrates domain-specific insights from ITIL processes, enabling more efficient decision-making. Experimental results demonstrate significant improvements in knowledge extraction and relationship mapping, offering a cutting-edge solution for enhancing cognitive computing in IT service environments.Keywords: ontology expansion, synthetic dataset, transformer fine-tuning, concept extraction, DOLCE, BERT, taxonomy, LLM, NER
Procedia PDF Downloads 14966 Localization of Buried People Using Received Signal Strength Indication Measurement of Wireless Sensor
Authors: Feng Tao, Han Ye, Shaoyi Liao
Abstract:
City constructions collapse after earthquake and people will be buried under ruins. Search and rescue should be conducted as soon as possible to save them. Therefore, according to the complicated environment, irregular aftershocks and rescue allow of no delay, a kind of target localization method based on RSSI (Received Signal Strength Indication) is proposed in this article. The target localization technology based on RSSI with the features of low cost and low complexity has been widely applied to nodes localization in WSN (Wireless Sensor Networks). Based on the theory of RSSI transmission and the environment impact to RSSI, this article conducts the experiments in five scenes, and multiple filtering algorithms are applied to original RSSI value in order to establish the signal propagation model with minimum test error respectively. Target location can be calculated from the distance, which can be estimated from signal propagation model, through improved centroid algorithm. Result shows that the localization technology based on RSSI is suitable for large-scale nodes localization. Among filtering algorithms, mixed filtering algorithm (average of average, median and Gaussian filtering) performs better than any other single filtering algorithm, and by using the signal propagation model, the minimum error of distance between known nodes and target node in the five scene is about 3.06m.Keywords: signal propagation model, centroid algorithm, localization, mixed filtering, RSSI
Procedia PDF Downloads 300965 Species Distribution Modelling for Assessing the Effect of Land Use Changes on the Habitat of Endangered Proboscis Monkey (Nasalis larvatus) in Kalimantan, Indonesia
Authors: Wardatutthoyyibah, Satyawan Pudyatmoko, Sena Adi Subrata, Muhammad Ali Imron
Abstract:
The proboscis monkey is an endemic species to the island of Borneo with conservation status IUCN (The International Union for Conservation of Nature) of endangered. The population of the monkey has a specific habitat and sensitive to habitat disturbances. As a consequence of increasing rates of land-use change in the last four decades, its population was reported significantly decreased. We quantified the effect of land use change on the proboscis monkey’s habitat through the species distribution modeling (SDM) approach with Maxent Software. We collected presence data and environmental variables, i.e., land cover, topography, bioclimate, distance to the river, distance to the road, and distance to the anthropogenic disturbance to generate predictive distribution maps of the monkeys. We compared two prediction maps for 2000 and 2015 data to represent the current habitat of the monkey. We overlaid the monkey’s predictive distribution map with the existing protected areas to investigate whether the habitat of the monkey is protected under the protected areas networks. The results showed that almost 50% of the monkey’s habitat reduced as the effect of land use change. And only 9% of the current proboscis monkey’s habitat within protected areas. These results are important for the master plan of conservation of the endangered proboscis monkey and provide scientific guidance for the future development incorporating biodiversity issue.Keywords: endemic species, land use change, maximum entropy, spatial distribution
Procedia PDF Downloads 158964 Cosmetic Surgery on the Rise: The Impact of Remote Communication
Authors: Bruno Di Pace, Roxanne H. Padley
Abstract:
Aims: The recent increase in remote video interaction has increased the number of requests for teleconsultations with plastic surgeons in private practice (70% in the UK and 64% in the USA). This study investigated the motivations for such an increase and the underlying psychological impact on patients. Method: An anonymous web-based poll of 8 questions was designed and distributed to patients seeking cosmetic surgery through social networks in both Italy and the UK. The questions gathered responses regarding 1. Reasons for pursuing cosmetic surgery; 2. The effects of delays caused by the SARS-COV-2 pandemic; 3. The effects on mood; 4. The influence of video conferencing on body-image perception. Results: 85 respondents completed the online poll. Overall, 68% of respondents stated that seeing themselves more frequently online had influenced their decision to seek cosmetic surgery. The types of surgeries indicated were predominantly to the upper body and face (82%). Delays and access to surgeons during the pandemic were perceived as negatively impacting patients' moods (95%). Body-image perception and self-esteem were lower than in the pre-pandemic, particularly during lockdown (72%). Patients were more inclined to undergo cosmetic surgery during the pandemic, both due to the wish to improve their “lockdown face” for video conferencing (77%) and also due to the benefits of home recovery while in smart working (58%). Conclusions: Overall, findings suggest that video conferencing has led to a significant increase in requests for cosmetic surgery and the so-called “Zoom Boom” effect.Keywords: cosmetic surgery, remote communication, telehealth, zoom boom
Procedia PDF Downloads 179963 A Bi-Objective Model to Optimize the Total Time and Idle Probability for Facility Location Problem Behaving as M/M/1/K Queues
Authors: Amirhossein Chambari
Abstract:
This article proposes a bi-objective model for the facility location problem subject to congestion (overcrowding). Motivated by implementations to locate servers in internet mirror sites, communication networks, one-server-systems, so on. This model consider for situations in which immobile (or fixed) service facilities are congested (or queued) by stochastic demand to behave as M/M/1/K queues. We consider for this problem two simultaneous perspectives; (1) Customers (desire to limit times of accessing and waiting for service) and (2) Service provider (desire to limit average facility idle-time). A bi-objective model is setup for facility location problem with two objective functions; (1) Minimizing sum of expected total traveling and waiting time (customers) and (2) Minimizing the average facility idle-time percentage (service provider). The proposed model belongs to the class of mixed-integer nonlinear programming models and the class of NP-hard problems. In addition, to solve the model, controlled elitist non-dominated sorting genetic algorithms (Controlled NSGA-II) and controlled elitist non-dominated ranking genetic algorithms (NRGA-I) are proposed. Furthermore, the two proposed metaheuristics algorithms are evaluated by establishing standard multiobjective metrics. Finally, the results are analyzed and some conclusions are given.Keywords: bi-objective, facility location, queueing, controlled NSGA-II, NRGA-I
Procedia PDF Downloads 583962 Redefining Identity of People with Disabilities Based on Content Analysis of Instagram Accounts
Authors: Grzegorz Kubinski
Abstract:
The proposed paper is focused on forms of identity expression in people with disabilities (PWD) in the social networks like Instagram. Theoretical analysis widely proposes using the new media as an assistive tool for improving wellbeing and labour activities of PWD. This kind of use is definitely important and plays a key role in all social inclusion processes. However, Instagram is not a place where PWD only express their own problems, but in the opposite, allows them to construct a new definition of disability. In the paper, the problem how this different than a classical approach to disability is created by PWD will be discussed. This issue will be scrutinized mainly in two points. Firstly, the question of how disability is changed by other everyday activities, like fashion or sport, will be described. Secondly, and this could be seen as more important, the point how PWD redefining their bodies creating a different form of aesthetic will be presented. The paper is based on content analysis of Instagram accounts. About 20 accounts created by PWD were analyzed for 6 month period, taking into account elements like photos, comments and discussions. All those information were studied in relation to 'everyday life' category and 'aesthetic' category. Works by T. Siebers, L. J. Davis or R. McRuer were used as theoretical background. Conclusions and interpretations presented in the proposed paper show that the Internet can be used by PWD not only as prosthetic and assistive tools. PWD willingly use them as modes of expression their independence, agency and identity. The paper proposes that in further research this way of using the Internet communication by PWD should be taken into account as an important part of the understanding of disability.Keywords: body, disability, identity, new media
Procedia PDF Downloads 138961 Machine Learning and Deep Learning Approach for People Recognition and Tracking in Crowd for Safety Monitoring
Authors: A. Degale Desta, Cheng Jian
Abstract:
Deep learning application in computer vision is rapidly advancing, giving it the ability to monitor the public and quickly identify potentially anomalous behaviour from crowd scenes. Therefore, the purpose of the current work is to improve the performance of safety of people in crowd events from panic behaviour through introducing the innovative idea of Aggregation of Ensembles (AOE), which makes use of the pre-trained ConvNets and a pool of classifiers to find anomalies in video data with packed scenes. According to the theory of algorithms that applied K-means, KNN, CNN, SVD, and Faster-CNN, YOLOv5 architectures learn different levels of semantic representation from crowd videos; the proposed approach leverages an ensemble of various fine-tuned convolutional neural networks (CNN), allowing for the extraction of enriched feature sets. In addition to the above algorithms, a long short-term memory neural network to forecast future feature values and a handmade feature that takes into consideration the peculiarities of the crowd to understand human behavior. On well-known datasets of panic situations, experiments are run to assess the effectiveness and precision of the suggested method. Results reveal that, compared to state-of-the-art methodologies, the system produces better and more promising results in terms of accuracy and processing speed.Keywords: action recognition, computer vision, crowd detecting and tracking, deep learning
Procedia PDF Downloads 161960 Understanding Cognitive Fatigue From FMRI Scans With Self-supervised Learning
Authors: Ashish Jaiswal, Ashwin Ramesh Babu, Mohammad Zaki Zadeh, Fillia Makedon, Glenn Wylie
Abstract:
Functional magnetic resonance imaging (fMRI) is a neuroimaging technique that records neural activations in the brain by capturing the blood oxygen level in different regions based on the task performed by a subject. Given fMRI data, the problem of predicting the state of cognitive fatigue in a person has not been investigated to its full extent. This paper proposes tackling this issue as a multi-class classification problem by dividing the state of cognitive fatigue into six different levels, ranging from no-fatigue to extreme fatigue conditions. We built a spatio-temporal model that uses convolutional neural networks (CNN) for spatial feature extraction and a long short-term memory (LSTM) network for temporal modeling of 4D fMRI scans. We also applied a self-supervised method called MoCo (Momentum Contrast) to pre-train our model on a public dataset BOLD5000 and fine-tuned it on our labeled dataset to predict cognitive fatigue. Our novel dataset contains fMRI scans from Traumatic Brain Injury (TBI) patients and healthy controls (HCs) while performing a series of N-back cognitive tasks. This method establishes a state-of-the-art technique to analyze cognitive fatigue from fMRI data and beats previous approaches to solve this problem.Keywords: fMRI, brain imaging, deep learning, self-supervised learning, contrastive learning, cognitive fatigue
Procedia PDF Downloads 190959 Visual, Zoological Metaphors and 'Urtiin Duu' (Long Song) in Alshaa, Inner Mongolia
Authors: Oyuna Weina
Abstract:
This study examines how musicians use visual and zoological metaphors for singing technique and voice quality in a genre of traditional music called urtiin duu (‘long song’) in Alshaa, Inner Mongolia, China. Previous studies have discussed melodic contour in Mongol music, but little study of the intersection of singing technique, visual and zoological metaphors has yet been undertaken. The purpose of this study is to address this lack by analysing urtiin duu itself, traditional pedagogy and performances, all of which have been inspired and are assessed by reference to nature and mobile pastoral herding practices. This study investigates the visual and zoological metaphors related to urtiin duu especially colour, the shape of the circle and animals in the Mongol community. Urtiin duu singing is associated with certain colours in song texts, in selection of repertoire and in the status of singers. Musicians also use colour to describe timbre. These colours in turn reference worship of nature, religions, and daily practices of most Mongols in Alshaa. Moreover, voice quality and singing technique are often related to the animals not only in song text but also in the approach to breathing and to melodic contour. Additionally, the concept of boronhoi (‘the shape of circle’), not only is applied to the melodic contour but also to the voice quality and singing technique. These three factors illustrate the connections among nature, spiritual world and everyday herding life of Mongols. These different connections provide evidence of multi-layered meanings. In contemporary Alshaa, urtiin duu singers received Western musical training from the city and returned to their homelands to perform urtiin duu. In doing so, they are also trying to reconnect with the history, nature and spiritual world in order to achieve their ideal sound. Within a multicultural society, singers negotiate amongst themselves, and with ethnic groups, audiences and government officials. The power of the metaphor therefore assists and reconnects the strength of regional identity and ethnic identity in Alshaa.Keywords: Alshaa, urtiin duu, visual, zoological metaphors
Procedia PDF Downloads 364958 Justice and the Juvenile: Changing Trends and Developments
Authors: Shikhar Shrivastava, Varun Khare
Abstract:
Background: We are confronted by a society that is becoming more complex, more mobile, and more dysfunctional. Teen pregnancy, suicide, elopement, and the perusal of dangerous drugs have become commonplace. In addition, children do not settle their disputes as they once did. Guns and knives are quotidian. Therefore, it has been an exigent to have a "Juvenile Code" that would provide specific substantive and procedural rules for juveniles in the justice system. However, until the twentieth century, there was little difference between how the justice system treated adults and children. Age was considered only in terms of appropriate punishment and juveniles were eligible for the same punishment as adults. Findings: The increased prevalence and legislative support for specialized courts, Juvenile Justice Boards, including juvenile drug, mental health and truancy court programs, as well as diversion programs and evidence-based approaches into the fabric of juvenile justice are just a few examples of recent advances. In India, various measures were taken to prosecute young offenders who committed violent crimes as adults. But it was argued that equating juveniles with adult criminals was neither scientifically correct nor normatively defensible. It would defeat the very purpose of the justice system. Methodology and Conclusion: This paper attempts to bring forth the results of analytical and descriptive research that examined changing trends in juvenile justice legislation. It covers the investigative and inspective practices of police, the various administrative agencies who have roles in implementing the legislation, the courts, and the detention centers. In this paper we shall discuss about how the juvenile justice system is the dumping ground for many of a youths’ problem. The changing notions of justice, from retributive to restorative and rehabilitative shall be discussed. A comparative study of the Juvenile act in India and that of the U.S has been discussed. Specific social institutions and forces that explain juvenile delinquency are identified. In addition, various influences on juvenile delinquency are noted, such as families, schools, peer groups and communities. The text concludes by addressing socialization, deterrence, imprisonments, alternatives, restitution and preventions.Keywords: juvenile, justice system, retributive, rehabilitative, delinquency
Procedia PDF Downloads 457957 Develop a Conceptual Data Model of Geotechnical Risk Assessment in Underground Coal Mining Using a Cloud-Based Machine Learning Platform
Authors: Reza Mohammadzadeh
Abstract:
The major challenges in geotechnical engineering in underground spaces arise from uncertainties and different probabilities. The collection, collation, and collaboration of existing data to incorporate them in analysis and design for given prospect evaluation would be a reliable, practical problem solving method under uncertainty. Machine learning (ML) is a subfield of artificial intelligence in statistical science which applies different techniques (e.g., Regression, neural networks, support vector machines, decision trees, random forests, genetic programming, etc.) on data to automatically learn and improve from them without being explicitly programmed and make decisions and predictions. In this paper, a conceptual database schema of geotechnical risks in underground coal mining based on a cloud system architecture has been designed. A new approach of risk assessment using a three-dimensional risk matrix supported by the level of knowledge (LoK) has been proposed in this model. Subsequently, the model workflow methodology stages have been described. In order to train data and LoK models deployment, an ML platform has been implemented. IBM Watson Studio, as a leading data science tool and data-driven cloud integration ML platform, is employed in this study. As a Use case, a data set of geotechnical hazards and risk assessment in underground coal mining were prepared to demonstrate the performance of the model, and accordingly, the results have been outlined.Keywords: data model, geotechnical risks, machine learning, underground coal mining
Procedia PDF Downloads 274956 Enhancement of Underwater Haze Image with Edge Reveal Using Pixel Normalization
Authors: M. Dhana Lakshmi, S. Sakthivel Murugan
Abstract:
As light passes from source to observer in the water medium, it is scattered by the suspended particulate matter. This scattering effect will plague the captured images with non-uniform illumination, blurring details, halo artefacts, weak edges, etc. To overcome this, pixel normalization with an Amended Unsharp Mask (AUM) filter is proposed to enhance the degraded image. To validate the robustness of the proposed technique irrespective of atmospheric light, the considered datasets are collected on dual locations. For those images, the maxima and minima pixel intensity value is computed and normalized; then the AUM filter is applied to strengthen the blurred edges. Finally, the enhanced image is obtained with good illumination and contrast. Thus, the proposed technique removes the effect of scattering called de-hazing and restores the perceptual information with enhanced edge detail. Both qualitative and quantitative analyses are done on considering the standard non-reference metric called underwater image sharpness measure (UISM), and underwater image quality measure (UIQM) is used to measure color, sharpness, and contrast for both of the location images. It is observed that the proposed technique has shown overwhelming performance compared to other deep-based enhancement networks and traditional techniques in an adaptive manner.Keywords: underwater drone imagery, pixel normalization, thresholding, masking, unsharp mask filter
Procedia PDF Downloads 195955 Urban Heat Island Effects on Human Health in Birmingham and Its Mitigation
Authors: N. A. Parvin, E. B. Ferranti, L. A. Chapman, C. A. Pfrang
Abstract:
This study intends to investigate the effects of the Urban Heat Island on public health in Birmingham. Birmingham is located at the center of the West Midlands and its weather is Highly variable due to geographical factors. Residential developments, road networks and infrastructure often replace open spaces and vegetation. This transformation causes the temperature of urban areas to increase and creates an "island" of higher temperatures in the urban landscape. Extreme heat in the urban area is influencing public health in the UK as well as in the world. Birmingham is a densely built-up area with skyscrapers and congested buildings in the city center, which is a barrier to air circulation. We will investigate the city regarding heat and cold-related human mortality and other impacts. We are using primary and secondary datasets to examine the effect of population shift and land-use change on the UHI in Birmingham. We will also use freely available weather data from the Birmingham Urban Observatory and will incorporate satellite data to determine urban spatial expansion and its effect on the UHI. We have produced a temperature map based on summer datasets of 2020, which has covered 25 weather stations in Birmingham to show the differences between diurnal and nocturnal summer and annual temperature trends. Some impacts of the UHI may be beneficial, such as the lengthening of the plant growing season, but most of them are highly negative. We are looking for various effects of urban heat which is impacting human health and investigating mitigation options.Keywords: urban heat, public health, climate change
Procedia PDF Downloads 96954 R-Killer: An Email-Based Ransomware Protection Tool
Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena
Abstract:
Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine
Procedia PDF Downloads 215953 Optimal and Critical Path Analysis of State Transportation Network Using Neo4J
Authors: Pallavi Bhogaram, Xiaolong Wu, Min He, Onyedikachi Okenwa
Abstract:
A transportation network is a realization of a spatial network, describing a structure which permits either vehicular movement or flow of some commodity. Examples include road networks, railways, air routes, pipelines, and many more. The transportation network plays a vital role in maintaining the vigor of the nation’s economy. Hence, ensuring the network stays resilient all the time, especially in the face of challenges such as heavy traffic loads and large scale natural disasters, is of utmost importance. In this paper, we used the Neo4j application to develop the graph. Neo4j is the world's leading open-source, NoSQL, a native graph database that implements an ACID-compliant transactional backend to applications. The Southern California network model is developed using the Neo4j application and obtained the most critical and optimal nodes and paths in the network using centrality algorithms. The edge betweenness centrality algorithm calculates the critical or optimal paths using Yen's k-shortest paths algorithm, and the node betweenness centrality algorithm calculates the amount of influence a node has over the network. The preliminary study results confirm that the Neo4j application can be a suitable tool to study the important nodes and the critical paths for the major congested metropolitan area.Keywords: critical path, transportation network, connectivity reliability, network model, Neo4j application, edge betweenness centrality index
Procedia PDF Downloads 134