Search results for: Distributed Algorithm
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5370

Search results for: Distributed Algorithm

1890 An Ethnobotanical Survey of Medicinal Plants for the Treatment of Infantile Diarrhea in the Eastern Cape Province of South Africa

Authors: Anela Lupuwana

Abstract:

The main objective of this paper is to develop an ethnobotanical survey that documents medicinal plants used to treat diarrhea among infants in the Eastern Cape province of South Africa. In South Africa’s pluralistic healthcare system, medicinal plants are an integral part of healing and treating an array of diseases. This is also the case in rural areas of South Africa, where healthcare facilities are hard to access. There is a lack of literature on the use of medicinal plants to cure ailments common to children, and this paper fills this gap. A total of 18 participants were interviewed using semi-structured interviews. A purposive approach was used to sample the study cohorts. A total of 28 medicinal plants representing 19 different families were recorded, with the family Asteraceae (11%) having the most medicinal plants. The remaining plants (82%) were distributed equally among the following families: Rubiaceae, Canellaceae, Aloaceae, Rutaceae, Thymeleaceae, Myrinaceae, Olinaceae, Iradeceae, Zingiberaceae, Capparaceae, Aizoaceae, Fabaceae, Geraniaceae, Cornaceae, Monimiaceae, Talinaceae, Chrysobalanaceae, and Icacinaceae. Oral administration was the most common mode of administration, with 82% of plants taken orally. Healing was proven to be holistic; it was more than just treating physical ailments as such; infants were protected from evil spirits that made them vulnerable to illnesses. There was also evidence of the assimilation of Dutch medicine and animal products into traditional healing methods. In order to mitigate the prevalence of disease and illness in South Africa, I recommend that diversity in healing practices should be acknowledged and appreciated.

Keywords: infants, traditional healers, primary care givers, traditional medicine

Procedia PDF Downloads 73
1889 Influence of Rational Emotive Therapy on Substance Abuse Among Secondary School Students in Benue State

Authors: Justina I. Reamen

Abstract:

The study examined the influence of rational emotive therapy on the treatment of substance abuse among Senior Secondary School Students in Makurdi metropolis Benue State Nigeria. This research adopted youth self report scale which was distributed to 1,690 SSS Students drawn from Government day Secondary School Makurdi and Government Model College Makurdi. Afterwards, 200 who were identified to indulge in substance abuse were selected for the study, 100 each from the two schools. 100 were taken as the control group and 100 as the experimental group, (50 of each group from each school). The Rational Emotive Behavior Therapy (REBT) intervention program was presented to the experimental group for seven (7) weeks. The students were taught how to apply REBT’s cognitive, Emotive and Behavioral techniques on their problems. After which post test was conducted to find out the impact of REBT on the treatment of adolescent students with substance abuse problem. GLM repeated measures of ANOVA were used to analyze the data from the study. The study reveals that REBT has positive impact on the treatment of adolescent students that abuse substances in the study area. Between pretest to post-test scores, a significant difference was observed (F=26.939; P=000) in substance abuse where a decrease of 1.12 (pre-10.91, post-9.79) scores was noticed irrespective of the groups. However, when the decrease in substance abuse were analyzed group wise, (experimental control) again significant F value (F=38.782; P=000) was obtained. From the mean scores it is evident that experimental group decreased it means by 2.56 (Pre-10.04 - Post-8.83) scores compared to control group, which changed its scores by only 0.32 scores (pre 11.04 - Post 11.36). Recommendations were made based on the findings of the research.

Keywords: abuse, influence, substance, therapy, treatment

Procedia PDF Downloads 229
1888 Suitable Die Shaping for a Rectangular Shape Bottle by Application of FEM and AI Technique

Authors: N. Ploysook, R. Rugsaj, C. Suvanjumrat

Abstract:

The characteristic requirement for producing rectangular shape bottles was a uniform thickness of the plastic bottle wall. Die shaping was a good technique which controlled the wall thickness of bottles. An advance technology which was the finite element method (FEM) for blowing parison to be a rectangular shape bottle was conducted to reduce waste plastic from a trial and error method of a die shaping and parison control method. The artificial intelligent (AI) comprised of artificial neural network and genetic algorithm was selected to optimize the die gap shape from the FEM results. The application of AI technique could optimize the suitable die gap shape for the parison blow molding which did not depend on the parison control method to produce rectangular bottles with the uniform wall. Particularly, this application can be used with cheap blow molding machines without a parison controller therefore it will reduce cost of production in the bottle blow molding process.

Keywords: AI, bottle, die shaping, FEM

Procedia PDF Downloads 233
1887 Analysis of Q-Learning on Artificial Neural Networks for Robot Control Using Live Video Feed

Authors: Nihal Murali, Kunal Gupta, Surekha Bhanot

Abstract:

Training of artificial neural networks (ANNs) using reinforcement learning (RL) techniques is being widely discussed in the robot learning literature. The high model complexity of ANNs along with the model-free nature of RL algorithms provides a desirable combination for many robotics applications. There is a huge need for algorithms that generalize using raw sensory inputs, such as vision, without any hand-engineered features or domain heuristics. In this paper, the standard control problem of line following robot was used as a test-bed, and an ANN controller for the robot was trained on images from a live video feed using Q-learning. A virtual agent was first trained in simulation environment and then deployed onto a robot’s hardware. The robot successfully learns to traverse a wide range of curves and displays excellent generalization ability. Qualitative analysis of the evolution of policies, performance and weights of the network provide insights into the nature and convergence of the learning algorithm.

Keywords: artificial neural networks, q-learning, reinforcement learning, robot learning

Procedia PDF Downloads 365
1886 Hydrological Response of the Glacierised Catchment: Himalayan Perspective

Authors: Sonu Khanal, Mandira Shrestha

Abstract:

Snow and Glaciers are the largest dependable reserved sources of water for the river system originating from the Himalayas so an accurate estimate of the volume of water contained in the snowpack and the rate of release of water from snow and glaciers are, therefore, needed for efficient management of the water resources. This research assess the fusion of energy exchanges between the snowpack, air above and soil below according to mass and energy balance which makes it apposite than the models using simple temperature index for the snow and glacier melt computation. UEBGrid a Distributed energy based model is used to calculate the melt which is then routed by Geo-SFM. The model robustness is maintained by incorporating the albedo generated from the Landsat-7 ETM images on a seasonal basis for the year 2002-2003 and substrate map derived from TM. The Substrate file includes predominantly the 4 major thematic layers viz Snow, clean ice, Glaciers and Barren land. This approach makes use of CPC RFE-2 and MERRA gridded data sets as the source of precipitation and climatic variables. The subsequent model run for the year between 2002-2008 shows a total annual melt of 17.15 meter is generate from the Marshyangdi Basin of which 71% is contributed by the glaciers , 18% by the rain and rest being from the snow melt. The albedo file is decisive in governing the melt dynamics as 30% increase in the generated surface albedo results in the 10% decrease in the simulated discharge. The melt routed with the land cover and soil variables using Geo-SFM shows Nash-Sutcliffe Efficiency of 0.60 with observed discharge for the study period.

Keywords: Glacier, Glacier melt, Snowmelt, Energy balance

Procedia PDF Downloads 450
1885 Chinese Speakers’ Language Attitudes Towards English Accents: Comparing Mainland and Hong Kong English Major Students’ Accent Preferences in ELF Communication

Authors: Jiaqi XU, Qingru Sun

Abstract:

Accent plays a crucial role in second language (L2) learners’ performance in the schooling context in the era of globalization, where English is adopted as a lingua franca (ELF). Previous studies found that Chinese mainland students prefer American English accents, whereas the young generations in Hong Kong prefer British accents. However, these studies neglect the non-native accents of English and fail to elaborate much about why the L2 learners differ in accent preferences between the two regions. Therefore, this research aims to bridge the research gap by 1) including both native and non-native varieties of English accents: American accent, British accent, Chinese Mandarin English accent, and Hong Kong English accent; and 2) uncovering and comparing the deeper reasons for the similar or/and different accent preferences between the Chinese mainland and Hong Kong speakers. This research designed a questionnaire including objective and subjective questions to investigate the students’ accent inclinations and the attitudes and reasons behind their linguistic choices. The questionnaire was distributed to eight participants (4 Chinese mainland students and 4 Hong Kong students) who were postgraduate students at a Hong Kong university. Based on the data collection, this research finds out one similarity and two differences between the Chinese mainland and Hong Kong students’ attitudes. The theories of identity construction and standard language ideology are further applied to analyze the reasons behind the similarities and differences and to evaluate how language attitudes intertwine with their identity construction and language ideology.

Keywords: accent, language attitudes, identity construction, language ideology, ELF communication

Procedia PDF Downloads 153
1884 Predicting Suicidal Behavior by an Accurate Monitoring of RNA Editing Biomarkers in Blood Samples

Authors: Berengere Vire, Nicolas Salvetat, Yoann Lannay, Guillaume Marcellin, Siem Van Der Laan, Franck Molina, Dinah Weissmann

Abstract:

Predicting suicidal behaviors is one of the most complex challenges of daily psychiatric practices. Today, suicide risk prediction using biological tools is not validated and is only based on subjective clinical reports of the at-risk individual. Therefore, there is a great need to identify biomarkers that would allow early identification of individuals at risk of suicide. Alterations of adenosine-to-inosine (A-to-I) RNA editing of neurotransmitter receptors and other proteins have been shown to be involved in etiology of different psychiatric disorders and linked to suicidal behavior. RNA editing is a co- or post-transcriptional process leading to a site-specific alteration in RNA sequences. It plays an important role in the epi transcriptomic regulation of RNA metabolism. On postmortem human brain tissue (prefrontal cortex) of depressed suicide victims, Alcediag found specific alterations of RNA editing activity on the mRNA coding for the serotonin 2C receptor (5-HT2cR). Additionally, an increase in expression levels of ADARs, the RNA editing enzymes, and modifications of RNA editing profiles of prime targets, such as phosphodiesterase 8A (PDE8A) mRNA, have also been observed. Interestingly, the PDE8A gene is located on chromosome 15q25.3, a genomic region that has recurrently been associated with the early-onset major depressive disorder (MDD). In the current study, we examined whether modifications in RNA editing profile of prime targets allow identifying disease-relevant blood biomarkers and evaluating suicide risk in patients. To address this question, we performed a clinical study to identify an RNA editing signature in blood of depressed patients with and without the history of suicide attempts. Patient’s samples were drawn in PAXgene tubes and analyzed on Alcediag’s proprietary RNA editing platform using next generation sequencing technology. In addition, gene expression analysis by quantitative PCR was performed. We generated a multivariate algorithm comprising various selected biomarkers to detect patients with a high risk to attempt suicide. We evaluated the diagnostic performance using the relative proportion of PDE8A mRNA editing at different sites and/or isoforms as well as the expression of PDE8A and the ADARs. The significance of these biomarkers for suicidality was evaluated using the area under the receiver-operating characteristic curve (AUC). The generated algorithm comprising the biomarkers was found to have strong diagnostic performances with high specificity and sensitivity. In conclusion, we developed tools to measure disease-specific biomarkers in blood samples of patients for identifying individuals at the greatest risk for future suicide attempts. This technology not only fosters patient management but is also suitable to predict the risk of drug-induced psychiatric side effects such as iatrogenic increase of suicidal ideas/behaviors.

Keywords: blood biomarker, next-generation-sequencing, RNA editing, suicide

Procedia PDF Downloads 251
1883 The Localization and Function of p38α Mitogen-Activated Protein Kinase (MAPK) in Rat Oocytes

Authors: Shifu Hu, Qiong Yu, Wei Xia, Changhong Zhu

Abstract:

Background: P38α MAPK, which is a member of the canonical MAPK family, is activated in response to various extracellular stresses and plays a role in multiple cellular processes. It is well known that p38α MAPK play vital roles in oocyte maturation, but the localization and functional roles of p38α MAPK during the meiotic maturation of rat oocytes remain unknown. Study Design: In this study, western-blot and immunofluorescent staining were used to investigate the expression and subcellular localization of p38α MAPK during the meiotic maturation of rat oocytes. SB203580, a specific inhibitor of p38α MAPK, was used to study the roles of p38α MAPK in the meiotic cell cycle of rat oocytes. Results: The results found that p38α MAPK phosphorylation (p-p38α MAPK, indicative of p38α MAPK activation) was low at the germinal vesicle (GV) stage, increased 3 h after germinal vesicle breakdown (GVBD), and maintained its maximum at MI (metaphase I) or M II (metaphase II). The p-p38α MAPK mainly accumulated in the germinal vesicle and had no obvious expression in the nucleus. From GVBD to M II, p-p38α MAPK was distributed in the cytoplasm around either the chromosomes or the spindle. We used SB203580, an inhibitor of p38α MAPK, to investigate the possible functional role of p38α MAPK during rat oocyte meiotic maturation. Treatment of GV stage oocytes with 20 μM SB203580 blocked p-p38α MAPK activity, and the spindles appeared abnormal. Additionally, the rate of GVBD after 3h of culture with 20 μM SB203580 (58.8%) was significantly inhibited compared with the control (82.5%, p < 0.05), and the polar body extrusion rate after 12 h of culture with SB203580 was also significantly decreased compared with the control (40.1 vs. 73.3%, p < 0.05). Conclusions: These data indicate that p38α MAPK may play a vital role in rat oocyte meiotic maturation.

Keywords: meiotic maturation, oocyte, p38α MAPK, spindle

Procedia PDF Downloads 153
1882 Formal Stress Management Teaching Incorporated into the First Year of a Doctor's Practice: A Career Transition Study of British Foundation Year 1 Doctors

Authors: Edward Ridyard, Vinary Varadarajan

Abstract:

Background and Aims: The first year as a doctor in any country represents a major career transition in any physician's life. During this period, many physicians concentrate on obtaining clinical skills but may not obtain the important skills necessary to cope with stress. In this study we elucidate stress levels amongst FY1 doctors regarding the transitioning into specialty career choices, working in the NHS and anxiety about future career success. Methods: A prospective single blinded analysis of Foundation Year one (FY1) trainees using a non-mandatory online questionnaire was distributed. No exclusion criteria were applied. The only inclusion criteria was the doctor was in a full-time FY1 post and this was their first job in the UK. A total of n= 22 doctors were included in the study. After data collection, statistical analysis using chi-squared testing was applied. Results: The large majority of FY1 doctors (72.7%) already knew what specialty they wished to pursue (p=0.0001). With regards to their future careers 45.5% of FY1 doctors stated "above average" stress levels. The majority of FY1 doctors (64.3%) stated their stress levels working in the NHS were either "above average" or "high". Finally, 81.8% of respondents know colleagues who have been put off from pursuing specialties due to the stress of competition. Conclusions: A large majority of FY1 doctors already know at this early stage what area they would like to specialise in. With this in mind, a large proportion have above "average" levels of stress with regards to securing this future career path. The most worrying finding is that 64.3% of FY1s stated they had "above average" or "high" stress levels working in the NHS. We therefore recommend formal stress management education to be incorporated into the foundation programme curriculum.

Keywords: stress, anxiety, junior doctor, education

Procedia PDF Downloads 363
1881 SNR Classification Using Multiple CNNs

Authors: Thinh Ngo, Paul Rad, Brian Kelley

Abstract:

Noise estimation is essential in today wireless systems for power control, adaptive modulation, interference suppression and quality of service. Deep learning (DL) has already been applied in the physical layer for modulation and signal classifications. Unacceptably low accuracy of less than 50% is found to undermine traditional application of DL classification for SNR prediction. In this paper, we use divide-and-conquer algorithm and classifier fusion method to simplify SNR classification and therefore enhances DL learning and prediction. Specifically, multiple CNNs are used for classification rather than a single CNN. Each CNN performs a binary classification of a single SNR with two labels: less than, greater than or equal. Together, multiple CNNs are combined to effectively classify over a range of SNR values from −20 ≤ SNR ≤ 32 dB.We use pre-trained CNNs to predict SNR over a wide range of joint channel parameters including multiple Doppler shifts (0, 60, 120 Hz), power-delay profiles, and signal-modulation types (QPSK,16QAM,64-QAM). The approach achieves individual SNR prediction accuracy of 92%, composite accuracy of 70% and prediction convergence one order of magnitude faster than that of traditional estimation.

Keywords: classification, CNN, deep learning, prediction, SNR

Procedia PDF Downloads 129
1880 On an Approach for Rule Generation in Association Rule Mining

Authors: B. Chandra

Abstract:

In Association Rule Mining, much attention has been paid for developing algorithms for large (frequent/closed/maximal) itemsets but very little attention has been paid to improve the performance of rule generation algorithms. Rule generation is an important part of Association Rule Mining. In this paper, a novel approach named NARG (Association Rule using Antecedent Support) has been proposed for rule generation that uses memory resident data structure named FCET (Frequent Closed Enumeration Tree) to find frequent/closed itemsets. In addition, the computational speed of NARG is enhanced by giving importance to the rules that have lower antecedent support. Comparative performance evaluation of NARG with fast association rule mining algorithm for rule generation has been done on synthetic datasets and real life datasets (taken from UCI Machine Learning Repository). Performance analysis shows that NARG is computationally faster in comparison to the existing algorithms for rule generation.

Keywords: knowledge discovery, association rule mining, antecedent support, rule generation

Procedia PDF Downloads 317
1879 Effect of Herbal Mineral Blend on Growth Performance of Broilers

Authors: M. Rizwan, S. Ahmad, U. Farooq, U. Mahmood, S. U. Rehman, P. Akhtar

Abstract:

This experiment was conducted to investigate the effect of supplementation of herbal and mineral mixture on growth performance of boilers. One hundred and eighty birds were randomly distributed into 6 experimental units of 3 replicates (10 birds/replicate) as: negative control (basal diet), positive control (Lincomycin at the rate of 5g/bag), commercially available herbal-mineral product FitFat™ at the rate of 150g/bag and 200g/bag, and herbal-mineral mixture at the rate of 150g/bag and herbal-mineral mixture at the rate of 300g/bag. The data regarding weekly feed intake, body weight gain and feed conversion ratio were recorded, and fecal samples were collected at the end of starter and finisher phase for nutrient digestibility trial. The results of body weight gain showed significant (P < 0.05) differences in 3rd week of age (506.90g), also, feed intake showed significant (P < 0.05) results in 1st (297.22g), 3rd (936.7g) and 4th (967.8g) week and feed conversion ratio indicated significant (P < 0.05) variations in 1st (1.14) and 3rd (1.74) week of age. The starter phase indicated significant (P < 0.05) differences among all treatments groups in body weight gain (902.2g), feed intake (1843.9g) and feed conversion ratio (1.78). In case of nutrient digestibility trial, results showed significant (P < 0.05) values of dry matter, crude protein, and crude fat in starter phase as 77.74%, 69.37%, and 61.18% respectively and 77.65%, 68.79% and 61.03% respectively, in finisher phase. Based on overall results, it was concluded that the dietary inclusion of combination of herbs and mineral can increase the production performance of broilers.

Keywords: herbal blend, minerals, crop filling, nutrient digestibility, broiler

Procedia PDF Downloads 208
1878 Cross-Cultural Experiences of South Asian Students in Chinese Universities: Predictors of the Students' Social-Media Engagements

Authors: Nadeem Akhtar, An Ran, Cornelius B. Pratt

Abstract:

China’s President Xi' vision of Belt and Road Initiative, an infrastructural project of development and connectivity, is attracting international students to Chinese universities, with Pakistan and India among the top-10 countries of origin of those students (Ministry of Education China, 2018). An additional factor in international students’ interest in Chinese universities is their improving global rankings of Chinese universities. Against that backdrop, this study addresses two overarching questions: (a) What factors explain South Asian students’ study-away experiences, particularly in their multicultural environments? and (b) What role do new media play in their adaptation to that environment? This study is guided by Stephen’s (2011) theoretical model, which suggests that social networks influence immigrants’ interactions with host and home culture. The present study used a structured questionnaire distributed through both WeChat and other online platforms to international students studying in Chinese universities. Preliminary results are threefold: (a) that the frequency of use of social media is a predictor of the level of adjustment of the students to their multicultural environment; (b) that social engagement with their international-student peers is a moderating factor in their experiential outcomes; and (c) length of stay in Chinese universities, surprisingly, was not a predictor of adaptation. A major implication of these findings is that, even though social media tend to be criticized for contributing to anomie and to diminishing social capital among youths and millennials, they can be poignant tools for cultural adaptation, particularly among international students in China. It remains to be seen if such outcomes occur among international students in other countries or world regions.

Keywords: adaptation, China's Belt and Road Initiative, international students, social media

Procedia PDF Downloads 120
1877 Architecture for QoS Based Service Selection Using Local Approach

Authors: Gopinath Ganapathy, Chellammal Surianarayanan

Abstract:

Services are growing rapidly and generally they are aggregated into a composite service to accomplish complex business processes. There may be several services that offer the same required function of a particular task in a composite service. Hence a choice has to be made for selecting suitable services from alternative functionally similar services. Quality of Service (QoS)plays as a discriminating factor in selecting which component services should be selected to satisfy the quality requirements of a user during service composition. There are two categories of approaches for QoS based service selection, namely global and local approaches. Global approaches are known to be Non-Polynomial (NP) hard in time and offer poor scalability in large scale composition. As an alternative to global methods, local selection methods which reduce the search space by breaking up the large/complex problem of selecting services for the workflow into independent sub problems of selecting services for individual tasks are coming up. In this paper, distributed architecture for selecting services based on QoS using local selection is presented with an overview of local selection methodology. The architecture describes the core components, namely, selection manager and QoS manager needed to implement the local approach and their functions. Selection manager consists of two components namely constraint decomposer which decomposes the given global or workflow level constraints in local or task level constraints and service selector which selects appropriate service for each task with maximum utility, satisfying the corresponding local constraints. QoS manager manages the QoS information at two levels namely, service class level and individual service level. The architecture serves as an implementation model for local selection.

Keywords: architecture of service selection, local method for service selection, QoS based service selection, approaches for QoS based service selection

Procedia PDF Downloads 423
1876 Power Management Strategy for Solar-Wind-Diesel Stand-Alone Hybrid Energy System

Authors: Md. Aminul Islam, Adel Merabet, Rachid Beguenane, Hussein Ibrahim

Abstract:

This paper presents a simulation and mathematical model of stand-alone solar-wind-diesel based hybrid energy system (HES). A power management system is designed for multiple energy resources in a stand-alone hybrid energy system. Both Solar photovoltaic and wind energy conversion system consists of maximum power point tracking (MPPT), voltage regulation, and basic power electronic interfaces. An additional diesel generator is included to support and improve the reliability of stand-alone system when renewable energy sources are not available. A power management strategy is introduced to distribute the generated power among resistive load banks. The frequency regulation is developed with conventional phase locked loop (PLL) system. The power management algorithm was applied in Matlab®/Simulink® to simulate the results.

Keywords: solar photovoltaic, wind energy, diesel engine, hybrid energy system, power management, frequency and voltage regulation

Procedia PDF Downloads 449
1875 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 316
1874 Intelligent Software Architecture and Automatic Re-Architecting Based on Machine Learning

Authors: Gebremeskel Hagos Gebremedhin, Feng Chong, Heyan Huang

Abstract:

Software system is the combination of architecture and organized components to accomplish a specific function or set of functions. A good software architecture facilitates application system development, promotes achievement of functional requirements, and supports system reconfiguration. We describe three studies demonstrating the utility of our architecture in the subdomain of mobile office robots and identify software engineering principles embodied in the architecture. The main aim of this paper is to analyze prove architecture design and automatic re-architecting using machine learning. Intelligence software architecture and automatic re-architecting process is reorganizing in to more suitable one of the software organizational structure system using the user access dataset for creating relationship among the components of the system. The 3-step approach of data mining was used to analyze effective recovery, transformation and implantation with the use of clustering algorithm. Therefore, automatic re-architecting without changing the source code is possible to solve the software complexity problem and system software reuse.

Keywords: intelligence, software architecture, re-architecting, software reuse, High level design

Procedia PDF Downloads 113
1873 Using the Timepix Detector at CERN Accelerator Facilities

Authors: Andrii Natochii

Abstract:

The UA9 collaboration in the last two years has installed two different types of detectors to investigate the channeling effect in the bent silicon crystals with high-energy particles beam on the CERN accelerator facilities: Cherenkov detector CpFM and silicon pixel detector Timepix. In the current work, we describe the main performances of the Timepix detector operation at the SPS and H8 extracted beamline at CERN. We are presenting some detector calibration results and tuning. Our research topics also cover a cluster analysis algorithm for the particle hits reconstruction. We describe the optimal acquisition setup for the Timepix device and the edges of its functionality for the high energy and flux beam monitoring. The measurements of the crystal parameters are very important for the future bent crystal applications and needs a track reconstruction apparatus. Thus, it was decided to construct a short range (1.2 m long) particle telescope based on the Timepix sensors and test it at H8 SPS extraction beamline. The obtained results will be shown as well.

Keywords: beam monitoring, channeling, particle tracking, Timepix detector

Procedia PDF Downloads 178
1872 Prevalence of Human Papillomavirus in Squamous Intraepithelial Lesions and Cervical Cancer in Women of the North of Chihuahua, Mexico

Authors: Estefania Ponce-Amaya, Ana Lidia Arellano-Ortiz, Cecilia Diaz-Hernandez, Jose Alberto Lopez-Diaz, Antonio De La Mora-Covarrubias, Claudia Lucia Vargas-Requena, Mauricio Salcedo-Vargas, Florinda Jimenez-Vega

Abstract:

Cervical Cancer (CC) is the second leading cause of death among women worldwide and it had been associated with a persistent infection of human papillomavirus (HPV). The goal of the current study was to identify the prevalence of HPV infection in women with abnormal Pap smear who were attended at Dysplasia Clinic of Ciudad Juarez, Mexico. Methods: Cervical samples from 146 patients, who attended the Colposcopy Clinic at Sanitary Jurisdiction II of Cd Juarez, were collected for histopathology and molecular study. DNA was isolated for the HPV detection by Polymerase Chain Reaction (PCR) using MY09/011 and GP5/6 primers. The associated risk factors were assessed by a questionnaire. The statistical analysis was performed by ANOVA, using EpiINFO V7 software. Results: HPV infection was present in 142 patients (97.3 %). The prevalence of HPV infection was distributed in a 96% of all evaluated groups, low-grade squamous intraepithelial lesion (LSIL), high-grade squamous intraepithelial lesion (HISIL) and CC. We found a statistical significance (α = <0.05) between gestation and number of births as risk factors. The median values showed an ascending tend according with the lesion progression. However, CC showed a statistically significant difference with respect to the pre-carcinogenic stages. Conclusions: In these Mexican patients exists a high prevalence of HPV infection, and for that reason, we are studying the most prevalent HPV genotypes in this population.

Keywords: cervical cancer, HPV, prevalence hpv, squamous intraepithelial lesion

Procedia PDF Downloads 314
1871 Literature Review: Adversarial Machine Learning Defense in Malware Detection

Authors: Leidy M. Aldana, Jorge E. Camargo

Abstract:

Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.

Keywords: Malware, adversarial, machine learning, defense, attack

Procedia PDF Downloads 57
1870 Personalized Email Marketing Strategy: A Reinforcement Learning Approach

Authors: Lei Zhang, Tingting Xu, Jun He, Zhenyu Yan

Abstract:

Email marketing is one of the most important segments of online marketing. It has been proved to be the most effective way to acquire and retain customers. The email content is vital to customers. Different customers may have different familiarity with a product, so a successful marketing strategy must personalize email content based on individual customers’ product affinity. In this study, we build our personalized email marketing strategy with three types of emails: nurture, promotion, and conversion. Each type of email has a different influence on customers. We investigate this difference by analyzing customers’ open rates, click rates and opt-out rates. Feature importance from response models is also analyzed. The goal of the marketing strategy is to improve the click rate on conversion-type emails. To build the personalized strategy, we formulate the problem as a reinforcement learning problem and adopt a Q-learning algorithm with variations. The simulation results show that our model-based strategy outperforms the current marketer’s strategy.

Keywords: email marketing, email content, reinforcement learning, machine learning, Q-learning

Procedia PDF Downloads 187
1869 Harmonic Data Preparation for Clustering and Classification

Authors: Ali Asheibi

Abstract:

The rapid increase in the size of databases required to store power quality monitoring data has demanded new techniques for analysing and understanding the data. One suggested technique to assist in analysis is data mining. Preparing raw data to be ready for data mining exploration take up most of the effort and time spent in the whole data mining process. Clustering is an important technique in data mining and machine learning in which underlying and meaningful groups of data are discovered. Large amounts of harmonic data have been collected from an actual harmonic monitoring system in a distribution system in Australia for three years. This amount of acquired data makes it difficult to identify operational events that significantly impact the harmonics generated on the system. In this paper, harmonic data preparation processes to better understanding of the data have been presented. Underlying classes in this data has then been identified using clustering technique based on the Minimum Message Length (MML) method. The underlying operational information contained within the clusters can be rapidly visualised by the engineers. The C5.0 algorithm was used for classification and interpretation of the generated clusters.

Keywords: data mining, harmonic data, clustering, classification

Procedia PDF Downloads 238
1868 Irrigation Challenges, Climate Change Adaptation and Sustainable Water Usage in Developing Countries. A Case Study, Nigeria

Authors: Faith Eweluegim Enahoro-Ofagbe

Abstract:

Worldwide, every nation is experiencing the effects of global warming. In developing countries, due to the heavy reliance on agriculture for socioeconomic growth and security, among other things, these countries are more affected by climate change, particularly with the availability of water. Floods, droughts, rising temperatures, saltwater intrusion, groundwater depletion, and other severe environmental alterations are all brought on by climatic change. Life depends on water, a vital resource; these ecological changes affect all water use, including agriculture and household water use. Therefore adequate and adaptive water usage strategies for sustainability are essential in developing countries. Therefore, this paper investigates Nigeria's challenges due to climate change and adaptive techniques that have evolved in response to such issues to ensure water management and sustainability for irrigation and provide quality water to residents. Questionnaires were distributed to respondents in the study area, central Nigeria, for quantitative evaluation of sustainable water resource management techniques. Physicochemical analysis was done, collecting soil and water samples from several locations under investigation. Findings show that farmers use different methods, ranging from intelligent technologies to traditional strategies for water resource management. Also, farmers need to learn better water resource management techniques for sustainability. Since more residents obtain their water from privately held sources, the government should enforce legislation to ensure that private borehole construction businesses treat water sources of poor quality before the general public uses them.

Keywords: developing countries, irrigation, strategies, sustainability, water resource management, water usage

Procedia PDF Downloads 108
1867 Efficacy of Clickers in L2 Interaction

Authors: Ryoo Hye Jin Agnes

Abstract:

This study aims to investigate the efficacy of clickers in fostering L2 class interaction. In an L2 classroom, active learner-to-learner interactions and learner-to-teacher interactions play an important role in language acquisition. In light of this, introducing learning tools that promote such interactions would benefit L2 classroom by fostering interaction. This is because the anonymity of clickers allows learners to express their needs without the social risks associated with speaking up in the class. clickers therefore efficiently help learners express their level of understanding during the process of learning itself. This allows for an evaluative feedback loop where both learners and teachers understand the level of progress of the learners, better enabling classrooms to adapt to the learners’ needs. Eventually this tool promotes participation from learners. This, in turn, is believed to be effective in fostering classroom interaction, allowing learning to take place in a more comfortable yet vibrant way. This study is finalized by presenting the result of an experiment conducted to verify the effectiveness of this approach when teaching pragmatic aspect of Korean expressions with similar semantic functions. The learning achievement of learners in the experimental group was found higher than the learners’ in a control group. A survey was distributed to the learners, questioning them regarding the efficacy of clickers, and how it contributed to their learning in areas such as motivation, self-assessment, increasing participation, as well as giving feedback to teachers. Analyzing the data collected from the questionnaire given to the learners, the study presented data suggesting that this approach increased the scope of interactivity in the classroom, thus not only increasing participation but enhancing the type of classroom participation among learners. This participation in turn led to a marked improvement in their communicative abilities.

Keywords: second language acquisition, interaction, clickers, learner response system, output from learners, learner’s cognitive process

Procedia PDF Downloads 513
1866 Implementation of Elliptic Curve Cryptography Encryption Engine on a FPGA

Authors: Mohamad Khairi Ishak

Abstract:

Conventional public key crypto systems such as RSA (Ron Rivest, Adi Shamir and Leonard Adleman), DSA (Digital Signature Algorithm), and Elgamal are no longer efficient to be implemented in the small, memory constrained devices. Elliptic Curve Cryptography (ECC), which allows smaller key length as compared to conventional public key crypto systems, has thus become a very attractive choice for many applications. This paper describes implementation of an elliptic curve cryptography (ECC) encryption engine on a FPGA. The system has been implemented in 2 different key sizes, which are 131 bits and 163 bits. Area and timing analysis are provided for both key sizes for comparison. The crypto system, which has been implemented on Altera’s EPF10K200SBC600-1, has a hardware size of 5945/9984 and 6913/9984 of logic cells for 131 bits implementation and 163 bits implementation respectively. The crypto system operates up to 43 MHz, and performs point multiplication operation in 11.3 ms for 131 bits implementation and 14.9 ms for 163 bits implementation. In terms of speed, our crypto system is about 8 times faster than the software implementation of the same system.

Keywords: elliptic curve cryptography, FPGA, key sizes, memory

Procedia PDF Downloads 310
1865 Production and Distribution Network Planning Optimization: A Case Study of Large Cement Company

Authors: Lokendra Kumar Devangan, Ajay Mishra

Abstract:

This paper describes the implementation of a large-scale SAS/OR model with significant pre-processing, scenario analysis, and post-processing work done using SAS. A large cement manufacturer with ten geographically distributed manufacturing plants for two variants of cement, around 400 warehouses serving as transshipment points, and several thousand distributor locations generating demand needed to optimize this multi-echelon, multi-modal transport supply chain separately for planning and allocation purposes. For monthly planning as well as daily allocation, the demand is deterministic. Rail and road networks connect any two points in this supply chain, creating tens of thousands of such connections. Constraints include the plant’s production capacity, transportation capacity, and rail wagon batch size constraints. Each demand point has a minimum and maximum for shipments received. Price varies at demand locations due to local factors. A large mixed integer programming model built using proc OPTMODEL decides production at plants, demand fulfilled at each location, and the shipment route to demand locations to maximize the profit contribution. Using base SAS, we did significant pre-processing of data and created inputs for the optimization. Using outputs generated by OPTMODEL and other processing completed using base SAS, we generated several reports that went into their enterprise system and created tables for easy consumption of the optimization results by operations.

Keywords: production planning, mixed integer optimization, network model, network optimization

Procedia PDF Downloads 59
1864 Parameters Optimization of the Laminated Composite Plate for Sound Transmission Problem

Authors: Yu T. Tsai, Jin H. Huang

Abstract:

In this paper, the specific sound transmission loss (TL) of the laminated composite plate (LCP) with different material properties in each layer is investigated. The numerical method to obtain the TL of the LCP is proposed by using elastic plate theory. The transfer matrix approach is novelty presented for computational efficiency in solving the numerous layers of dynamic stiffness matrix (D-matrix) of the LCP. Besides the numerical simulations for calculating the TL of the LCP, the material properties inverse method is presented for the design of a laminated composite plate analogous to a metallic plate with a specified TL. As a result, it demonstrates that the proposed computational algorithm exhibits high efficiency with a small number of iterations for achieving the goal. This method can be effectively employed to design and develop tailor-made materials for various applications.

Keywords: sound transmission loss, laminated composite plate, transfer matrix approach, inverse problem, elastic plate theory, material properties

Procedia PDF Downloads 377
1863 Application of Artificial Neural Network for Prediction of High Tensile Steel Strands in Post-Tensioned Slabs

Authors: Gaurav Sancheti

Abstract:

This study presents an impacting approach of Artificial Neural Networks (ANNs) in determining the quantity of High Tensile Steel (HTS) strands required in post-tensioned (PT) slabs. Various PT slab configurations were generated by varying the span and depth of the slab. For each of these slab configurations, quantity of required HTS strands were recorded. ANNs with backpropagation algorithm and varying architectures were developed and their performance was evaluated in terms of Mean Square Error (MSE). The recorded data for the quantity of HTS strands was used as a feeder database for training the developed ANNs. The networks were validated using various validation techniques. The results show that the proposed ANNs have a great potential with good prediction and generalization capability.

Keywords: artificial neural networks, back propagation, conceptual design, high tensile steel strands, post tensioned slabs, validation techniques

Procedia PDF Downloads 215
1862 Framework for Socio-Technical Issues in Requirements Engineering for Developing Resilient Machine Vision Systems Using Levels of Automation through the Lifecycle

Authors: Ryan Messina, Mehedi Hasan

Abstract:

This research is to examine the impacts of using data to generate performance requirements for automation in visual inspections using machine vision. These situations are intended for design and how projects can smooth the transfer of tacit knowledge to using an algorithm. We have proposed a framework when specifying machine vision systems. This framework utilizes varying levels of automation as contingency planning to reduce data processing complexity. Using data assists in extracting tacit knowledge from those who can perform the manual tasks to assist design the system; this means that real data from the system is always referenced and minimizes errors between participating parties. We propose using three indicators to know if the project has a high risk of failing to meet requirements related to accuracy and reliability. All systems tested achieved a better integration into operations after applying the framework.

Keywords: automation, contingency planning, continuous engineering, control theory, machine vision, system requirements, system thinking

Procedia PDF Downloads 197
1861 Alternator Fault Detection Using Wigner-Ville Distribution

Authors: Amin Ranjbar, Amir Arsalan Jalili Zolfaghari, Amir Abolfazl Suratgar, Mehrdad Khajavi

Abstract:

This paper describes two stages of learning-based fault detection procedure in alternators. The procedure consists of three states of machine condition namely shortened brush, high impedance relay and maintaining a healthy condition in the alternator. The fault detection algorithm uses Wigner-Ville distribution as a feature extractor and also appropriate feature classifier. In this work, ANN (Artificial Neural Network) and also SVM (support vector machine) were compared to determine more suitable performance evaluated by the mean squared of errors criteria. Modules work together to detect possible faulty conditions of machines working. To test the method performance, a signal database is prepared by making different conditions on a laboratory setup. Therefore, it seems by implementing this method, satisfactory results are achieved.

Keywords: alternator, artificial neural network, support vector machine, time-frequency analysis, Wigner-Ville distribution

Procedia PDF Downloads 365