Search results for: double nearest proportion feature extraction
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5539

Search results for: double nearest proportion feature extraction

1999 A Tuning Method for Microwave Filter via Complex Neural Network and Improved Space Mapping

Authors: Shengbiao Wu, Weihua Cao, Min Wu, Can Liu

Abstract:

This paper presents an intelligent tuning method of microwave filter based on complex neural network and improved space mapping. The tuning process consists of two stages: the initial tuning and the fine tuning. At the beginning of the tuning, the return loss of the filter is transferred to the passband via the error of phase. During the fine tuning, the phase shift caused by the transmission line and the higher order mode is removed by the curve fitting. Then, an Cauchy method based on the admittance parameter (Y-parameter) is used to extract the coupling matrix. The influence of the resonant cavity loss is eliminated during the parameter extraction process. By using processed data pairs (the amount of screw variation and the variation of the coupling matrix), a tuning model is established by the complex neural network. In view of the improved space mapping algorithm, the mapping relationship between the actual model and the ideal model is established, and the amplitude and direction of the tuning is constantly updated. Finally, the tuning experiment of the eight order coaxial cavity filter shows that the proposed method has a good effect in tuning time and tuning precision.

Keywords: microwave filter, scattering parameter, coupling matrix, intelligent tuning

Procedia PDF Downloads 297
1998 Insufficiency Fracture of Femoral Head in Patients Treated With Intramedullary Nailing for Proximal Femur Fracture

Authors: Jai Hyung Park, Eugene Kim, Jin Hun Park, Min Joon Oh

Abstract:

Introduction: Subchondral insufficiency fracture of the femoral head (SIF) is a rare complication; however, it has been recognized to cause femoral head collapse. Subchondral insufficiency fracture (SIF) is caused by normal or physiological stress without any trauma. It has been reported in osteoporotic patients after the fixation of the proximal femur with an Intramedullary nail. Case presentation: We reported 5 cases with SIF of the femoral head after proximal femur fracture fixation with Intra-medullary nail. All patients had osteoporosis as an underlying disease. Good reduction was achieved in all 5 patients. SIF was found from about 3 months to 4 years after the initial operation, and all the fractures were solidly united at the final diagnosis. We investigated retrospectively the feature of those cases and several factors that affected the occurrence of SIF. Discussion: There are a few discussions regarding the SIF of the femoral head. These discussions may include the predisposing risk factors, how to diagnose the SIF in osteoporotic patients, and the peri-operative factors to prevent SIF. Conclusion: Subchondral insufficiency fracture of the femoral head is a considerable complication after the internal fixation of the proximal femur. There are several factors that can be modified. If they could be controlled in the peri-operative period, SIF could be prevented or handled in advance. Other options related to arthroplasty can be considered in old osteoporotic patients.

Keywords: insufficiency fracture of femoral head, intra-medullary nail, osteoporosis, proximal femur fracture

Procedia PDF Downloads 122
1997 Pharmacogenetic Analysis of Inter-Ethnic Variability in the Uptake Transporter SLCO1B1 Gene in Colombian, Mozambican, and Portuguese Populations

Authors: Mulata Haile Nega, Derebew Fikadu Berhe, Vera Ribeiro Marques

Abstract:

There is no epidemiologic data on this gene polymorphism in several countries. Therefore, this study aimed to assess the genotype and allele frequencies of the gene variant in three countries. This study involved healthy individuals from Colombia, Mozambique, and Portugal. Genomic DNA was isolated from blood samples using the Qiamp DNA Extraction Kit (Qiagen). The isolated DNA was genotyped using Polymerase Chain Reaction (PCR) - Restriction Fragment Length Polymorphism. Microstat and GraphPad quick cal software were used for the Chi-square test and evaluation of Hardy-Weinberg equilibrium, respectively. A total of 181 individuals’ blood sample was analyzed. Overall, TT (74.0%) genotype was the highest, and CC (7.8%) was the lowest. Country wise genotypic frequencies were Colombia 47(70.2%) TT, 12(17.9%) TC and 8(11.9%) CC; Mozambique 47(88.7%) TT, 5(9.4%) TC, and 1(1.9%) CC; and Portugal 40(65.6%) TT, 16(26.2%) TC, and 5(8.2%) CC. The reference (T) allele was highest among Mozambicans (93.4%) compared to Colombians (79.1%) and Portuguese (78.7%). Mozambicans showed statistically significant genotypic and allelic frequency differences compared to Colombians (p<0.01) and Portuguese (p <0.01). Overall and country-wise, the CC genotype was less frequent and relatively high for Colombians and Portuguese populations. This finding may imply statins risk-benefit variability associated with CC genotype among these populations that needs further understanding.

Keywords: c.521T>C, polymorphism, SLCO1B1, SNP, statins

Procedia PDF Downloads 126
1996 Time to Cure from Obstetric Fistula and Its Associated Factors among Women Admitted to Addis Ababa Hamlin Fistula Hospital, Addis Ababa Ethiopia: A Survival Analysis

Authors: Chernet Mulugeta, Girma Seyoum, Yeshineh Demrew, Kehabtimer Shiferaw

Abstract:

Background: Obstetric fistula (OF) is a serious medical condition that includes an abnormal opening between the vagina and bladder (vesico-vaginal fistula) or the vagina and rectum (recto-vaginal fistula). It is usually caused by prolonged obstructed labour. Despite its serious health and psychosocial consequences, there is a paucity of evidence regarding the time it takes to heal from OF. Objective: The aim of this study was to assess the time to cure from obstetric fistula and its predictors among women admitted to Addis Ababa Hamlin Fistula Hospital, Addis Ababa, Ethiopia. Methodology: An institution-based retrospective cohort study was conducted from January 2015 to December 2020 among a randomly selected 434 women with OF in Addis Ababa Hamlin Fistula Hospital. Data was collected using a structured checklist adapted from a similar study. The open data kit (ODK) collected data was exported and analyzed by using STATA (14.2). Kaplan Meir was used to compare the recovery time from OF. To identify the predictors of OF, a Cox regression model was fitted, and an adjusted hazard ratio with a 95% confidence interval was used to estimate the strength of the associations. Results: The average time to recover from obstetric fistula was 3.95 (95% CI: 3.0-4.6) weeks. About ¾ of the women [72.8% (95% CI - 0.65-1.2)] were physically cured of obstetric fistula. Having secondary education and above [AHR=3.52; 95% CI (1.98, 6.25)] compared to no formal education, having a live birth [AHR=1.64; 95% CI (1.22, 2.21)], having an intact bladder [AHR=2.47; 95% CI (1.1, 5.54)] compared to totally destructed, and having a grade 1 fistula [AHR=1.98; 95% CI (1.19, 3.31)] compared to grade 3 were the significant predictors of shorter time to cure from an obstetric fistula. Conclusion and recommendation: Overall, the proportion of women with OF who were not being cured was unacceptably high. The time it takes for them to recover from the fistula was also extended. It connotes us to work on the identified predictors to improve the time to recovery from OF.

Keywords: time to recovery, obstetric fistula, predictors, Ethiopia

Procedia PDF Downloads 81
1995 A Comparative Analysis of Body Idioms in Two Romance Languages and in English Aiming at Vocabulary Teaching and Learning

Authors: Marilei Amadeu Sabino

Abstract:

Before the advent of Cognitive Linguistics, metaphor was considered a stylistic issue, but now it is viewed as a critical component of everyday language and a fundamental mechanism of human conceptualizations of the world. It means that human beings' conceptual system (the way we think and act) is metaphorical in nature. Another interesting hypothesis in Cognitive Linguistics is that cognition is embodied, that is, our cognition is influenced by our experiences in the physical world: the mind is connected to the body and the body influences the mind. In this sense, it is believed that many conceptual metaphors appear to be potentially universal or near-universal, because people across the world share certain bodily experiences. In these terms, many metaphors may be identical or very similar in several languages. Thus, in this study, we analyzed some somatic (also called body) idioms of Italian and Portuguese languages, in order to investigate the proportion in which their metaphors are the same, similar or different in both languages. It was selected hundreds of Italian idioms in dictionaries and indicated their corresponding idioms in Portuguese. The analysis allowed to conclude that much of the studied expressions are really structurally, semantically and metaphorically identical or similar in both languages. We also contrasted some Portuguese and Italian somatic expressions to their corresponding English idioms to have a multilingual perspective of the issue, and it also led to the conclusion that the most common idioms based on metaphors are probably those that have to do with the human body. Although this is mere speculation and needs more study, the results found incite relevant discussions on issues that matter Foreign and Second Language Teaching and Learning, including the retention of vocabulary. The teaching of the metaphorically different body idioms also plays an important role in language learning and teaching as it will be shown in this paper. Acknowledgments: FAPESP – São Paulo State Research Support Foundation –the financial support offered (proc. n° 2017/02064-7).

Keywords: body idioms, cognitive linguistics, metaphor, vocabulary teaching and learning

Procedia PDF Downloads 331
1994 Contextualizing Household Food Security: A Comparison of Two Villages, Ambros and Maramanzhi, South Africa

Authors: Felicity Aphiwe Mkhongi, Walter Musakwa

Abstract:

Smallholder crop production is a defining factor in achieving food security, particularly at the household level. However, the number of abandoned arable fields is increasing in communal areas of South Africa. While substantial efforts have been devoted to addressing food insecurity in the country, ownership of arable land has not been supplemented with sustainable food production for households. This paper analyses household food security in the context of deagrarianization in two villages, Ambros (Eastern Cape) and Maramanzhi (Limpopo). Semi-structured questionnaires were administered to acquire both qualitative and quantitative data from 106 heads of households. The IBM SPSS Statistics 28.0 computer program was applied to complete data analysis. From the findings of the study, it was evident that compared to arable fields, a greater proportion of households own home-gardens with an average size of 2100m in Ambros and 3400m in Maramanzhi village. The majority of arable fields were abandoned, particularly in Ambros village. Household food access challenges were measured using the Household Food Insecurity Access Scale (HFIAS). This food security indicator revealed that the majority of households were mildly food insecure owing to food shortages emanating from insufficient monthly income and waning household crop production. Food was rated as a very important reason for engaging in cultivation in both villages of the study, but deagrarianization has eroded opportunities for increasing household crop production. Among other possible solutions, this study recommends that the government invest more in agriculture to allow for sustainable strategies that revive abandoned arable land, such as arable fields in communal areas of South Africa, as this could increase food production for households.

Keywords: cultivation, deagrarianization, food security, rural households, smallholder farmers

Procedia PDF Downloads 52
1993 Detection of Mycobacteria spp by PCR in Raw Milk Samples Collected from Iran

Authors: Shokoufeh Roudashti, Shahin Bahari, Fakhri Haghi, Habib Zeighami, Ghazal Naderi, Paniz Shirmast

Abstract:

Background: Mycobacterium tuberculosis complex (MTBC) causes tuberculosis (TB) in humans and animals. Mycobacterium MTBC is one of the most important species of zoonotic pathogens that can be transmitted from cattle to humans. The disease can transmit to human by direct contact with the infected animals, drinking unpasteurized milk and consumption of uncooked meat. The presence of these opportunistic, pathogenic bacteria in bovine milk has emerged as a public-health concern, especially among individuals who consume raw milk. Tuberculosis MTBC is the predominant infectious cause of morbidity and morality worldwide, It is estimated that one third of the world population (approx. 1.8 billion persons) is infected with M. tuberculosis and each year there are 8 million new cases worldwide. The aim of this study, to detect Mycobacterium MTBC in raw milk samples using polymerase chain reaction (PCR). Materials and Methods: In the present study, 60 raw milk samples were collected from rural areas in Zanjan, Iran. After extraction of DNAs and using special primers for Is6110 gene as a marker, PCR was applied to detect the presence or non-presence of the related gene. Results: According to the findings of this study, 8 (13.5 %) out of 60 milk samples were positive for Mycobacterium spp (P < 0.1). Conclusions: The Outbreak of genus Mycobacteria spp in milk samples were determined to be relatively high in Zanjan, Iran.

Keywords: Mycobacteria spp, raw milk, PCR, Zanjan

Procedia PDF Downloads 295
1992 Friend or Foe: Decoding the Legal Challenges Posed by Artificial Intellegence in the Era of Intellectual Property

Authors: Latika Choudhary

Abstract:

“The potential benefits of Artificial Intelligence are huge, So are the dangers.” - Dave Water. Artificial intelligence is one of the facet of Information technology domain which despite several attempts does not have a clear definition or ambit. However it can be understood as technology to solve problems via automated decisions and predictions. Artificial intelligence is essentially an algorithm based technology which analyses the large amounts of data and then solves problems by detecting useful patterns. Owing to its automated feature it will not be wrong to say that humans & AI have more utility than humans alone or computers alone.1 For many decades AI experienced enthusiasm as well as setbacks, yet it has today become part and parcel of our everyday life, making it convenient or at times problematic. AI and related technology encompass Intellectual Property in multiple ways, the most important being AI technology for management of Intellectual Property, IP for protecting AI and IP as a hindrance to the transparency of AI systems. Thus the relationship between the two is of reciprocity as IP influences AI and vice versa. While AI is a recent concept, the IP laws for protection or even dealing with its challenges are relatively older, raising the need for revision to keep up with the pace of technological advancements. This paper will analyze the relationship between AI and IP to determine how beneficial or conflictual the same is, address how the old concepts of IP are being stretched to its maximum limits so as to accommodate the unwanted consequences of the Artificial Intelligence and propose ways to mitigate the situation so that AI becomes the friend it is and not turn into a potential foe it appears to be.

Keywords: intellectual property rights, information technology, algorithm, artificial intelligence

Procedia PDF Downloads 83
1991 Information Disclosure And Financial Sentiment Index Using a Machine Learning Approach

Authors: Alev Atak

Abstract:

In this paper, we aim to create a financial sentiment index by investigating the company’s voluntary information disclosures. We retrieve structured content from BIST 100 companies’ financial reports for the period 1998-2018 and extract relevant financial information for sentiment analysis through Natural Language Processing. We measure strategy-related disclosures and their cross-sectional variation and classify report content into generic sections using synonym lists divided into four main categories according to their liquidity risk profile, risk positions, intra-annual information, and exposure to risk. We use Word Error Rate and Cosin Similarity for comparing and measuring text similarity and derivation in sets of texts. In addition to performing text extraction, we will provide a range of text analysis options, such as the readability metrics, word counts using pre-determined lists (e.g., forward-looking, uncertainty, tone, etc.), and comparison with reference corpus (word, parts of speech and semantic level). Therefore, we create an adequate analytical tool and a financial dictionary to depict the importance of granular financial disclosure for investors to identify correctly the risk-taking behavior and hence make the aggregated effects traceable.

Keywords: financial sentiment, machine learning, information disclosure, risk

Procedia PDF Downloads 91
1990 Robust Medical Image Watermarking based on Contourlet and Extraction Using ICA

Authors: S. Saju, G. Thirugnanam

Abstract:

In this paper, a medical image watermarking algorithm based on contourlet is proposed. Medical image watermarking is a special subcategory of image watermarking in the sense that images have special requirements. Watermarked medical images should not differ perceptually from their original counterparts because clinical reading of images must not be affected. Watermarking techniques based on wavelet transform are reported in many literatures but robustness and security using contourlet are better when compared to wavelet transform. The main challenge in exploring geometry in images comes from the discrete nature of the data. In this paper, original image is decomposed to two level using contourlet and the watermark is embedded in the resultant sub-bands. Sub-band selection is based on the value of Peak Signal to Noise Ratio (PSNR) that is calculated between watermarked and original image. To extract the watermark, Kernel ICA is used and it has a novel characteristic is that it does not require the transformation process to extract the watermark. Simulation results show that proposed scheme is robust against attacks such as Salt and Pepper noise, Median filtering and rotation. The performance measures like PSNR and Similarity measure are evaluated and compared with Discrete Wavelet Transform (DWT) to prove the robustness of the scheme. Simulations are carried out using Matlab Software.

Keywords: digital watermarking, independent component analysis, wavelet transform, contourlet

Procedia PDF Downloads 521
1989 Comparative Life Cycle Assessment of Roofing System for Abu Dhabi

Authors: Iyasu Eibedingil

Abstract:

The construction industry is one of the major factors responsible for causing a negative impact on the environment. It has the largest share in the use of natural resources including land use, material extraction, and greenhouse gases emissions. For this reason, it is imperative to reduce its environmental impact through the construction of sustainable buildings with less impact. These days, it is possible to measure the environmental impact by using different tools such as the life cycle assessment (LCA) approach. Given this premise, this study explored the environmental impact of two types of roofing systems through comparative life cycle assessment approach. The tiles were analyzed to select the most environmentally friendly roofing system for the villa at Khalifa City A, Abu Dhabi, United Arab Emirates. These products are available in various forms; however, in this study concrete roof tiles and clay roof tiles were considered. The results showed that concrete roof tiles have lower environmental impact. In all scenarios considered, manufacturing the roof tiles locally, using recovered fuels for firing clay tiles, and using renewable energy (electricity from PV plant) showed that the concrete roof tiles were found to be excellent in terms of its embodied carbon, embodied the energy and various other environmental performance indicators.

Keywords: clay roof tile, concrete roof tile, life cycle assessment, sensitivity analysis

Procedia PDF Downloads 384
1988 Compilation of Islamic Law as Law Applied Religious Courts in Indonesia (Responding to Changes in Religious Courts Authority)

Authors: Hamdan Arief Hanif, Rahmat Sidiq

Abstract:

Indonesia is a country of law, the legal system adopted by Indonesia is a civil law system. A major feature of the civil law is the codified legislation. Meanwhile the majority of society Indonesia are Muslims, whilst Islamic law itself having the sources written in Qur'an, Sunnah and the opinion of Muslim scholars, generally not codified in book form of legislation that is easy on the set as a reference. in Indonesia, many scholars have different opinions in decisions so that there is no legal certainty in Muslim civil cases, so the need for legal codification, which, as the source of the judges in deciding a case, especially a case in religious courts. This paper raised the topic of discussion which offers a solution to the application of the codification of the Islamic Law which became the core resources in delivering a verdict against Islamic civil related issue; codification usually called a compilation of Islamic Law. Compilation of Islamic Law is highly recommended as a core reference for the judges in religious courts in Indonesia. This compilation which includes a collection of large number of opinions scholars (book of fiqh) that existed previously and are ripened in deduce in order to unify the existing differences. This paper also discusses how the early formation of the compilation and as the right solution in order to create legal certainty and justice especially for the muslim community in Indonesia.

Keywords: Islamic law, compilation, law applied core, religious court

Procedia PDF Downloads 352
1987 Cytotoxic Effect of Crude Extract of Sea Pen Virgularia gustaviana on HeLa and MDA-MB-231 Cancer Cell Lines

Authors: Sharareh Sharifi, Pargol Ghavam Mostafavi, Ali Mashinchian Moradi, Mohammad Hadi Givianrad, Hassan Niknejad

Abstract:

Marine organisms such as soft coral, sponge, ascidians, and tunicate containing rich source of natural compound have been studied in last decades because of their special chemical compounds with anticancer properties. The aim of this study was to investigate anti-cancer property of ethyl acetate extracted from marine sea pen Virgularia gustaviana found from Persian Gulf coastal (Bandar Abbas). The extraction processes were carried out with ethyl acetate for five days. Thin layer chromatography (TLC) and high-performance liquid chromatography (HPLC) were used for qualitative identification of crude extract. The viability of HeLa and MDA-Mb-231 cancer cells was investigated using MTT assay at the concentration of 25, 50, and a 100 µl/ml of ethyl acetate is extracted. The crude extract of Virgularia gustaviana demonstrated ten fractions with different Retention factor (Rf) by TLC and Retention time (Rt) evaluated by HPLC. The crude extract dose-dependently decreased cancer cell viability compared to control group. According to the results, the ethyl acetate extracted from Virgularia gustaviana inhibits the growth of cancer cells, an effect which needs to be further investigated in the future studies.

Keywords: anti-cancer, Hela cancer cell, MDA-Md-231 cancer cell, Virgularia gustavina

Procedia PDF Downloads 429
1986 Visual Intelligence: Perception, Image and Manipulation in Visual Communication

Authors: Poojitha Vemula

Abstract:

Understanding how we use image manipulation to communicate through an audience’s perceptions and conceive visual intelligence. With the use of many software and high-end skills, designers have developed a third eye to combine two different visuals and create the desired image by using photoshop and other software skills. The purpose of visual intelligence is to convey a message to the targeted audience. For instance, the images of models are retouched on their skin to make it more convincing and draw attention from the audience. There are many ways of manipulating an image, such as double exposure, retouching photography inks or paint airbrushing and piecing photos together, or enhancing the brightness and contrast. To understand visual intelligence, a questionnaire survey as well as research was conducted on how image manipulation is used by both the audience and the designers. This depends on the message that needs to be conveyed by the brands. For instance, Fair & Lovely, a brightening cream for ladies use a lot of retouching and effects to show the dramatic change the cream takes effect on dark or dusky faces. Thus the designer’s role is to use their third eye to incorporate the message into visuals. The research and questionnaire survey concludes the perceptions and manipulations used in visual communication. However this is all to make an effortless communication between the designer and the audience by using the skills of the designer and the features provided by the software. The objective of visual intelligence is to covet the message of the brands that advertise their products or services by using visuals through softwares. Conveying a message through visual intelligence requires an audiences perceptions and understanding from the visuals created by the artists or designers. Visual intelligence determines how we use our technical skills to retouch and manipulate an image for a better understanding to convey the message to the targeted audience. This also bridges the communication between the brand and the audience.

Keywords: graphic design, visual communication, convey messages, photoshop, image manipulation

Procedia PDF Downloads 204
1985 Attribution of Strategic Motive, Business Efficiencies, Firm Economies, and Market Factors as Motivations of Restaurant Industry Vertical Integration Adoption: A Structural Equation Model

Authors: Sy, Melecio Jr

Abstract:

The decision to adopt vertical integration (VI) is firm-specific, but there is a common practice among businesses in an industry to maximize the massive potential benefits of VI. This study aims to determine VI adoption in the restaurant industry in Davao City. Using a two-step sampling process, the study used a validated survey questionnaire among 264 restaurant owners and managers randomly selected and geographically classified. It is a quantitative study where the data were subjected to a structural equation model (SEM). The results revealed that VI is present but limited to procurement, production, restaurant services, and online marketing. Raw materials were outsourced while delivery to customers through third-party delivery services. VI slowly increased over ten years except for online marketing, which has grown significantly in a few years. The endogenous and exogenous variables were correlated and established the linear regression model. The SEM's best fit model revealed that strategic motives (SMOT) and market factors (MFAC) influenced VI adoption while MFAC is the best predictor. Favorable market factors may lead restaurants to adopt VI. It is, thus, recommended for restaurants to institutionalize strategic management, quantify the impact of double marginalization in future studies as a reason for VI and conduct this study during the new normal to see the influence of business efficiencies and firm economies on VI adoption.

Keywords: business efficiencies, business management, davao city, firm economies, market factors, philippines, strategic motives, structural equation model, supply chain, vertical integration adoption

Procedia PDF Downloads 67
1984 An Overview of Domain Models of Urban Quantitative Analysis

Authors: Mohan Li

Abstract:

Nowadays, intelligent research technology is more and more important than traditional research methods in urban research work, and this proportion will greatly increase in the next few decades. Frequently such analyzing work cannot be carried without some software engineering knowledge. And here, domain models of urban research will be necessary when applying software engineering knowledge to urban work. In many urban plan practice projects, making rational models, feeding reliable data, and providing enough computation all make indispensable assistance in producing good urban planning. During the whole work process, domain models can optimize workflow design. At present, human beings have entered the era of big data. The amount of digital data generated by cities every day will increase at an exponential rate, and new data forms are constantly emerging. How to select a suitable data set from the massive amount of data, manage and process it has become an ability that more and more planners and urban researchers need to possess. This paper summarizes and makes predictions of the emergence of technologies and technological iterations that may affect urban research in the future, discover urban problems, and implement targeted sustainable urban strategies. They are summarized into seven major domain models. They are urban and rural regional domain model, urban ecological domain model, urban industry domain model, development dynamic domain model, urban social and cultural domain model, urban traffic domain model, and urban space domain model. These seven domain models can be used to guide the construction of systematic urban research topics and help researchers organize a series of intelligent analytical tools, such as Python, R, GIS, etc. These seven models make full use of quantitative spatial analysis, machine learning, and other technologies to achieve higher efficiency and accuracy in urban research, assisting people in making reasonable decisions.

Keywords: big data, domain model, urban planning, urban quantitative analysis, machine learning, workflow design

Procedia PDF Downloads 171
1983 Effects of Changes in LULC on Hydrological Response in Upper Indus Basin

Authors: Ahmad Ammar, Umar Khan Khattak, Muhammad Majid

Abstract:

Empirically based lumped hydrologic models have an extensive track record of use for various watershed managements and flood related studies. This study focuses on the impacts of LULC change for 10 year period on the discharge in watershed using lumped model HEC-HMS. The Indus above Tarbela region acts as a source of the main flood events in the middle and lower portions of Indus because of the amount of rainfall and topographic setting of the region. The discharge pattern of the region is influenced by the LULC associated with it. In this study the Landsat TM images were used to do LULC analysis of the watershed. Satellite daily precipitation TRMM data was used as input rainfall. The input variables for model building in HEC-HMS were then calculated based on the GIS data collected and pre-processed in HEC-GeoHMS. SCS-CN was used as transform model, SCS unit hydrograph method was used as loss model and Muskingum was used as routing model. For discharge simulation years 2000 and 2010 were taken. HEC-HMS was calibrated for the year 2000 and then validated for 2010.The performance of the model was assessed through calibration and validation process and resulted R2=0.92 during calibration and validation. Relative Bias for the years 2000 was -9% and for2010 was -14%. The result shows that in 10 years the impact of LULC change on discharge has been negligible in the study area overall. One reason is that, the proportion of built-up area in the watershed, which is the main causative factor of change in discharge, is less than 1% of the total area. However, locally, the impact of development was found significant in built up area of Mansehra city. The analysis was done on Mansehra city sub-watershed with an area of about 16 km2 and has more than 13% built up area in 2010. The results showed that with an increase of 40% built-up area in the city from 2000 to 2010 the discharge values increased about 33 percent, indicating the impact of LULC change on discharge value.

Keywords: LULC change, HEC-HMS, Indus Above Tarbela, SCS-CN

Procedia PDF Downloads 504
1982 Teaching–Learning-Based Optimization: An Efficient Method for Chinese as a Second Language

Authors: Qi Wang

Abstract:

In the classroom, teachers have been trained to complete the target task within the limited lecture time, meanwhile learners need to receive a lot of new knowledge, however, most of the time the learners come without the proper pre-class preparation to efficiently take in the contents taught in class. Under this circumstance, teachers do have no time to check whether the learners fully understand the content or not, how the learners communicate in the different contexts, until teachers see the results when the learners are tested. In the past decade, the teaching of Chinese has taken a trend. Teaching focuses less on the use of proper grammatical terms/punctuation and is now placing a heavier focus on the materials from real life contexts. As a result, it has become a greater challenge to teachers, as this requires teachers to fully understand/prepare what they teach and explain the content with simple and understandable words to learners. On the other hand, the same challenge also applies to the learners, who come from different countries. As they have to use what they learnt, based on their personal understanding of the material to effectively communicate with others in the classroom, even in the contexts of a day to day communication. To reach this win-win stage, Feynman’s Technique plays a very important role. This practical report presents you how the Feynman’s Technique is applied into Chinese courses, both writing & oral, to motivate the learners to practice more on writing, reading and speaking in the past few years. Part 1, analysis of different teaching styles and different types of learners, to find the most efficient way to both teachers and learners. Part 2, based on the theory of Feynman’s Technique, how to let learners build the knowledge from knowing the name of something to knowing something, via different designed target tasks. Part 3. The outcomes show that Feynman’s Technique is the interaction of learning style and teaching style, the double-edged sword of Teaching & Learning Chinese as a Second Language.

Keywords: Chinese, Feynman’s technique, learners, teachers

Procedia PDF Downloads 148
1981 Frequency Modulation Continuous Wave Radar Human Fall Detection Based on Time-Varying Range-Doppler Features

Authors: Xiang Yu, Chuntao Feng, Lu Yang, Meiyang Song, Wenhao Zhou

Abstract:

The existing two-dimensional micro-Doppler features extraction ignores the correlation information between the spatial and temporal dimension features. For the range-Doppler map, the time dimension is introduced, and a frequency modulation continuous wave (FMCW) radar human fall detection algorithm based on time-varying range-Doppler features is proposed. Firstly, the range-Doppler sequence maps are generated from the echo signals of the continuous motion of the human body collected by the radar. Then the three-dimensional data cube composed of multiple frames of range-Doppler maps is input into the three-dimensional Convolutional Neural Network (3D CNN). The spatial and temporal features of time-varying range-Doppler are extracted by the convolution layer and pool layer at the same time. Finally, the extracted spatial and temporal features are input into the fully connected layer for classification. The experimental results show that the proposed fall detection algorithm has a detection accuracy of 95.66%.

Keywords: FMCW radar, fall detection, 3D CNN, time-varying range-doppler features

Procedia PDF Downloads 114
1980 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.

Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability

Procedia PDF Downloads 99
1979 Multi-Layer Multi-Feature Background Subtraction Using Codebook Model Framework

Authors: Yun-Tao Zhang, Jong-Yeop Bae, Whoi-Yul Kim

Abstract:

Background modeling and subtraction in video analysis has been widely proved to be an effective method for moving objects detection in many computer vision applications. Over the past years, a large number of approaches have been developed to tackle different types of challenges in this field. However, the dynamic background and illumination variations are two of the most frequently occurring issues in the practical situation. This paper presents a new two-layer model based on codebook algorithm incorporated with local binary pattern (LBP) texture measure, targeted for handling dynamic background and illumination variation problems. More specifically, the first layer is designed by block-based codebook combining with LBP histogram and mean values of RGB color channels. Because of the invariance of the LBP features with respect to monotonic gray-scale changes, this layer can produce block-wise detection results with considerable tolerance of illumination variations. The pixel-based codebook is employed to reinforce the precision from the outputs of the first layer which is to eliminate false positives further. As a result, the proposed approach can greatly promote the accuracy under the circumstances of dynamic background and illumination changes. Experimental results on several popular background subtraction datasets demonstrate a very competitive performance compared to previous models.

Keywords: background subtraction, codebook model, local binary pattern, dynamic background, illumination change

Procedia PDF Downloads 210
1978 Signal Integrity Performance Analysis in Capacitive and Inductively Coupled Very Large Scale Integration Interconnect Models

Authors: Mudavath Raju, Bhaskar Gugulothu, B. Rajendra Naik

Abstract:

The rapid advances in Very Large Scale Integration (VLSI) technology has resulted in the reduction of minimum feature size to sub-quarter microns and switching time in tens of picoseconds or even less. As a result, the degradation of high-speed digital circuits due to signal integrity issues such as coupling effects, clock feedthrough, crosstalk noise and delay uncertainty noise. Crosstalk noise in VLSI interconnects is a major concern and reduction in VLSI interconnect has become more important for high-speed digital circuits. It is the most effectively considered in Deep Sub Micron (DSM) and Ultra Deep Sub Micron (UDSM) technology. Increasing spacing in-between aggressor and victim line is one of the technique to reduce the crosstalk. Guard trace or shield insertion in-between aggressor and victim is also one of the prominent options for the minimization of crosstalk. In this paper, far end crosstalk noise is estimated with mutual inductance and capacitance RLC interconnect model. Also investigated the extent of crosstalk in capacitive and inductively coupled interconnects to minimizes the same through shield insertion technique.

Keywords: VLSI, interconnects, signal integrity, crosstalk, shield insertion, guard trace, deep sub micron

Procedia PDF Downloads 182
1977 Predicting Stack Overflow Accepted Answers Using Features and Models with Varying Degrees of Complexity

Authors: Osayande Pascal Omondiagbe, Sherlock a Licorish

Abstract:

Stack Overflow is a popular community question and answer portal which is used by practitioners to solve technology-related challenges during software development. Previous studies have shown that this forum is becoming a substitute for official software programming languages documentation. While tools have looked to aid developers by presenting interfaces to explore Stack Overflow, developers often face challenges searching through many possible answers to their questions, and this extends the development time. To this end, researchers have provided ways of predicting acceptable Stack Overflow answers by using various modeling techniques. However, less interest is dedicated to examining the performance and quality of typically used modeling methods, and especially in relation to models’ and features’ complexity. Such insights could be of practical significance to the many practitioners that use Stack Overflow. This study examines the performance and quality of various modeling methods that are used for predicting acceptable answers on Stack Overflow, drawn from 2014, 2015 and 2016. Our findings reveal significant differences in models’ performance and quality given the type of features and complexity of models used. Researchers examining classifiers’ performance and quality and features’ complexity may leverage these findings in selecting suitable techniques when developing prediction models.

Keywords: feature selection, modeling and prediction, neural network, random forest, stack overflow

Procedia PDF Downloads 131
1976 The Effect of Antibiotic Use on Blood Cultures: Implications for Future Policy

Authors: Avirup Chowdhury, Angus K. McFadyen, Linsey Batchelor

Abstract:

Blood cultures (BCs) are an important aspect of management of the septic patient, identifying the underlying pathogen and its antibiotic sensitivities. However, while the current literature outlines indications for initial BCs to be taken, there is little guidance for repeat sampling in the following 5-day period and little information on how antibiotic use can affect the usefulness of this investigation. A retrospective cohort study was conducted using inpatients who had undergone 2 or more BCs within 5 days between April 2016 and April 2017 at a 400-bed hospital in the west of Scotland and received antibiotic therapy between the first and second BCs. The data for BC sampling was collected from the electronic microbiology database, and cross-referenced with data from the hospital electronic prescribing system. Overall, 283 BCs were included in the study, taken from 92 patients (mean 3.08 cultures per patient, range 2-10). All 92 patients had initial BCs, of which 83 were positive (90%). 65 had a further sample within 24 hours of commencement of antibiotics, with 35 positive (54%). 23 had samples within 24-48 hours, with 4 (17%) positive; 12 patients had sampling at 48-72 hours, 12 at 72-96 hours, and 10 at 96-120 hours, with none positive. McNemar’s Exact Test was used to calculate statistical significance for patients who received blood cultures in multiple time blocks (Initial, < 24h, 24-120h, > 120h). For initial vs. < 24h-post BCs (53 patients tested), the proportion of positives fell from 46/53 to 29/53 (one-tailed P=0.002, OR 3.43, 95% CI 1.48-7.96). For initial vs 24-120h (n=42), the proportions were 38/42 and 4/42 respectively (P < 0.001, OR 35.0, 95% CI 4.79-255.48). For initial vs > 120h (n=36), these were 33/36 and 2/36 (P < 0.001,OR ∞). These were also calculated for a positive in initial or < 24h vs. 24-120h (n=42), with proportions of 41/42 and 4/42 (P < 0.001, OR 38.0, 95% CI 5.22-276.78); and for initial or < 24h vs > 120h (n=36), with proportions of 35/36 and 2/36 respectively (P < 0.001, OR ∞). This data appears to show that taking an initial BC followed by a BC within 24 hours of antibiotic commencement would maximise blood culture yield while minimising the risk of false negative results. This could potentially remove the need for as many as 46% of BC samples without adversely affecting patient care. BC yield decreases sharply after 48 hours of antibiotic use, and may not provide any clinically useful information after this time. Further multi-centre studies would validate these findings, and provide a foundation for future health policy generation.

Keywords: antibiotics, blood culture, efficacy, inpatient

Procedia PDF Downloads 169
1975 The Use of Neuter in Oedipus Lines to Refer to Antigone in Phoenissae of Seneca

Authors: Cíntia Martins Sanches

Abstract:

In the first part of Phoenissae of Seneca, Antigone is a guide to Oedipus, and they leave Thebes: he is blind searching for death (inflicting the punishment himself wished on the killer of Laius, ie exile and death); she is trying to convince him to give up such punishment and bring him back to Thebes. Concerning Oedipus lines, we observed a high frequency of Latin neuter in the treatment the protagonist gave to his daughter Antigone. We considered in this study that such frequency may be related to the sanctification of the daughter, who is seen by him as an enlightened being and without defects, free of the human condition (which takes on the existence of failures by essence). This study, thus, puts forward an analysis of the passages the said feature is present, relating them to the effect of meaning found in each occurrence. As part of a doctorate, this study investigates the stylistic idiom of Seneca in the Oedipus and Phoenissae tragedies, aiming at translating both tragedies expressively. The concept of stylistic idiom concerns the stylistic affinity required for a translation to be equivalent to the source text. In this wise, this study inquires into how the Latin text is organized poetically, pointing out the expressive features frequently appearing in both dramas. The method we used is based on the Semiotics theory — observing how connotation, ie a language use in which prevails the poetic function, naturally polysemous, acts to achieve each expressive effect.

Keywords: antigone, neuter, Oedipus, Phoenissae, Seneca

Procedia PDF Downloads 282
1974 Recognizing an Individual, Their Topic of Conversation and Cultural Background from 3D Body Movement

Authors: Gheida J. Shahrour, Martin J. Russell

Abstract:

The 3D body movement signals captured during human-human conversation include clues not only to the content of people’s communication but also to their culture and personality. This paper is concerned with automatic extraction of this information from body movement signals. For the purpose of this research, we collected a novel corpus from 27 subjects, arranged them into groups according to their culture. We arranged each group into pairs and each pair communicated with each other about different topics. A state-of-art recognition system is applied to the problems of person, culture, and topic recognition. We borrowed modeling, classification, and normalization techniques from speech recognition. We used Gaussian Mixture Modeling (GMM) as the main technique for building our three systems, obtaining 77.78%, 55.47%, and 39.06% from the person, culture, and topic recognition systems respectively. In addition, we combined the above GMM systems with Support Vector Machines (SVM) to obtain 85.42%, 62.50%, and 40.63% accuracy for person, culture, and topic recognition respectively. Although direct comparison among these three recognition systems is difficult, it seems that our person recognition system performs best for both GMM and GMM-SVM, suggesting that inter-subject differences (i.e. subject’s personality traits) are a major source of variation. When removing these traits from culture and topic recognition systems using the Nuisance Attribute Projection (NAP) and the Intersession Variability Compensation (ISVC) techniques, we obtained 73.44% and 46.09% accuracy from culture and topic recognition systems respectively.

Keywords: person recognition, topic recognition, culture recognition, 3D body movement signals, variability compensation

Procedia PDF Downloads 535
1973 Groundwater Monitoring Using a Community: Science Approach

Authors: Shobha Kumari Yadav, Yubaraj Satyal, Ajaya Dixit

Abstract:

In addressing groundwater depletion, it is important to develop evidence base so to be used in assessing the state of its degradation. Groundwater data is limited compared to meteorological data, which impedes the groundwater use and management plan. Monitoring of groundwater levels provides information base to assess the condition of aquifers, their responses to water extraction, land-use change, and climatic variability. It is important to maintain a network of spatially distributed, long-term monitoring wells to support groundwater management plan. Monitoring involving local community is a cost effective approach that generates real time data to effectively manage groundwater use. This paper presents the relationship between rainfall and spring flow, which are the main source of freshwater for drinking, household consumptions and agriculture in hills of Nepal. The supply and withdrawal of water from springs depends upon local hydrology and the meteorological characteristics- such as rainfall, evapotranspiration and interflow. The study offers evidence of the use of scientific method and community based initiative for managing groundwater and springshed. The approach presents a method to replicate similar initiative in other parts of the country for maintaining integrity of springs.

Keywords: citizen science, groundwater, water resource management, Nepal

Procedia PDF Downloads 195
1972 Health Promoting Behaviors among Thai Older Adults: Trend and Association with Health Status

Authors: Alongkorn Pekalee, Rossarin Gray

Abstract:

Various determinants associated with older health include socio-demographic factors and health-promoting behaviors but lack in scholars recommended what factors associated with health status in specific sub-groups of older adults. The current study aims to explore the health-promoting behaviors and to examine and compare the associations of these factors with self-rated health status among three older age cohorts in Thai traditional context. Methods: This study is based on the Survey of Older Persons in Thailand (SOPT), in 2017, conducted by the National Statistical Office (NSO) of Thailand. Participants were classified into three groups by using the Thai contextual recommendation: youngest-old cohort (60-69), old-old cohort (70-79) and oldest old cohort (80 or older). Health promoting behaviors are the behaviors which associated with the health status of older adults include alcohol consumption, smoking, diet, and physical activity. Health status was defined as a subjective measurement by using self-rated health, a simple measure of general health. The socio-demographic factors, health-promoting behaviors, and health status were explained and summarized by descriptive statistics. The binary logistic regression was performed to analyze the data and evaluate the associations between independent and dependent variables. Results: Increase of age contributes to a higher proportion of health-promoting behaviors. All variables were associated with self-reported health status as good health among three older age cohorts statistically significant (p-value = 0.000). However, the influence of income sufficiency on health status is more notable, especially in older adults who aged 60-69 and 70-79. The influence of dietary and physical activity on health status became greater as age increased. Conclusion: the results suggest that income sufficiency should be noted in a plan to promote healthy aging, and co-residence should be more concerned especially in the oldest old cohort. Moreover, the interventions or policies to promote older health behaviors like diet and physical activity should be emphasized in the oldest old cohort more than others.

Keywords: health-promoting behaviors, older adults, self- rated health, Thailand

Procedia PDF Downloads 135
1971 Effect of Citrulline on the Physical Performance of a Soccer-Specific Exercises in Adult Professional Soccer Players

Authors: Bezuglov Eduard, Ryland Morgans, Talibov Oleg, Kalinin Evgeny, Butovsky Mikhail, Savin Evgeny, Tzgoev Eduard, Artemii Lazarev, Bekzhan Pirmakhanov, Anthony C. Hackney

Abstract:

Currently, there is conflicting evidence regarding the efficacy of citrulline for physical performance and post-exercise recovery. Moreover, the vast majority of studies conducted used physically active volunteers from the general population and heterogeneous exercise protocols that are not specific to most sports. A single use of citrulline, regardless of the dose, will not have a significant effect on physical performance and post-exercise recovery in highly trained soccer players performing sport-specific exercises at maximum intensity. To evaluate the effectiveness of a single administration of citrulline at various doses in adult male professional soccer players performing sport-specific exercise at maximum intensity. A randomized, double-blind, placebo-controlled study analyzing eighteen soccer players from the top divisions of several European countries. The participants were randomized into three groups of six and performed a field-based soccer-specific test at 115% VO2max for 18-minutes. Comparative analysis of the cardiovascular system, physical activity, subjective perceived fatigue and post-exercise recovery was conducted. There were no statistically significant differences in more than one analyzed parameter. A single application of 3 to 6 grams of citrulline does not affect physical performance, subjective feeling of fatigue and post-exercise recovery in adult professional soccer players who have performed a sport-specific test. Currently, citrulline cannot be recommended for use as a supplement in adult professional soccer players

Keywords: citrulline, performance, recovery, soccer players

Procedia PDF Downloads 94
1970 A New Approach for Solving Fractional Coupled Pdes

Authors: Prashant Pandey

Abstract:

In the present article, an effective Laguerre collocation method is used to obtain the approximate solution of a system of coupled fractional-order non-linear reaction-advection-diffusion equation with prescribed initial and boundary conditions. In the proposed scheme, Laguerre polynomials are used together with an operational matrix and collocation method to obtain approximate solutions of the coupled system, so that our proposed model is converted into a system of algebraic equations which can be solved employing the Newton method. The solution profiles of the coupled system are presented graphically for different particular cases. The salient feature of the present article is finding the stability analysis of the proposed method and also the demonstration of the lower variation of solute concentrations with respect to the column length in the fractional-order system compared to the integer-order system. To show the higher efficiency, reliability, and accuracy of the proposed scheme, a comparison between the numerical results of Burger’s coupled system and its existing analytical result is reported. There are high compatibility and consistency between the approximate solution and its exact solution to a higher order of accuracy. The exhibition of error analysis for each case through tables and graphs confirms the super-linearly convergence rate of the proposed method.

Keywords: fractional coupled PDE, stability and convergence analysis, diffusion equation, Laguerre polynomials, spectral method

Procedia PDF Downloads 143