Search results for: computer viruses
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2492

Search results for: computer viruses

2102 Seroprevalence of Hepatitis B and C among Healthcare Workers in Dutse Metropolis, Jigawa State, Nigeria

Authors: N. M. Sani, I. Bitrus, A. M. Sarki, N. S. Mujahid

Abstract:

Hepatitis is one of the neglected infectious diseases in sub Saharan Africa, and most of the available data is based on blood donors. Health care workers (HCWs) often get infected as a result of their close contact with patients. A cross-sectional study was conducted to determine the prevalence of hepatitis B and C among this group of professionals with a view to improving the quality of care to their patients. Hepatitis B and C infections pose a major public health problem worldwide. While infection is highest in the developing world particularly Asia and sub-Saharan Africa, healthcare workers are at higher risk of acquiring blood-borne viral infections, particularly Hepatitis B and C which are mostly asymptomatic. This study was aimed at determining the prevalence of Hepatitis B and C infections and associated risk factors among health care workers in Dutse Metropolis, Jigawa State - Nigeria. A standard rapid immuno-chromatographic technique i.e. rapid ELISA was used to screen all sera for Hepatitis B surface antigen (HBsAg) and Hepatitis C viral antibody (HCVAb) respectively. Strips containing coated antibodies and antigens to HBV and HCV respectively were removed from the foil. Strips were labeled according to samples. Using a separate disposable pipette, 2 drops of the sample (plasma) were added into each test strip and allowed to run across the absorbent pad. Results were read after 15 minutes. The prevalence of HBV and HCV infection in 100 healthcare workers was determined by testing the plasma collected from the clients during their normal checkup using HBsAg and HCVAb test strips. Results were subjected to statistical analysis using chi-square test. The prevalence of HBV among HCWs was 19 out of 100 (19.0%) and that of HCV was 5 out of 100 (5.0%) where in both cases, higher prevalence was observed among female nurses. It was also observed that all HCV positive cases were recorded among nurses only. The study revealed that nurses are at greater risk of contracting HBV and HCV due to their frequent contact with patients. It is therefore recommended that effective vaccination and other infection control measures be encouraged among healthcare workers.

Keywords: prevalence, hepatitis, viruses, healthcare workers, infection

Procedia PDF Downloads 328
2101 Ontology for a Voice Transcription of OpenStreetMap Data: The Case of Space Apprehension by Visually Impaired Persons

Authors: Said Boularouk, Didier Josselin, Eitan Altman

Abstract:

In this paper, we present a vocal ontology of OpenStreetMap data for the apprehension of space by visually impaired people. Indeed, the platform based on produsage gives a freedom to data producers to choose the descriptors of geocoded locations. Unfortunately, this freedom, called also folksonomy leads to complicate subsequent searches of data. We try to solve this issue in a simple but usable method to extract data from OSM databases in order to send them to visually impaired people using Text To Speech technology. We focus on how to help people suffering from visual disability to plan their itinerary, to comprehend a map by querying computer and getting information about surrounding environment in a mono-modal human-computer dialogue.

Keywords: TTS, ontology, open street map, visually impaired

Procedia PDF Downloads 273
2100 Syntactic Analyzer for Tamil Language

Authors: Franklin Thambi Jose.S

Abstract:

Computational Linguistics is a branch of linguistics, which deals with the computer and linguistic levels. It is also said, as a branch of language studies which applies computer techniques to linguistics field. In Computational Linguistics, Natural Language Processing plays an important role. This came to exist because of the invention of Information Technology. In computational syntax, the syntactic analyser breaks a sentence into phrases and clauses and identifies the sentence with the syntactic information. Tamil is one of the major Dravidian languages, which has a very long written history of more than 2000 years. It is mainly spoken in Tamilnadu (in India), Srilanka, Malaysia and Singapore. It is an official language in Tamilnadu (in India), Srilanka, Malaysia and Singapore. In Malaysia Tamil speaking people are considered as an ethnic group. In Tamil syntax, the sentences in Tamil are classified into four for this research, namely: 1. Main Sentence 2. Interrogative Sentence 3. Equational Sentence 4. Elliptical Sentence. In computational syntax, the first step is to provide required information regarding the head and its constituent of each sentence. This information will be incorporated to the system using programming languages. Now the system can easily analyse a given sentence with the criteria or mechanisms given to it. Providing needful criteria or mechanisms to the computer to identify the basic types of sentences using Syntactic parser in Tamil language is the major objective of this paper.

Keywords: tamil, syntax, criteria, sentences, parser

Procedia PDF Downloads 489
2099 Actionable Personalised Learning Strategies to Improve a Growth-Mindset in an Educational Setting Using Artificial Intelligence

Authors: Garry Gorman, Nigel McKelvey, James Connolly

Abstract:

This study will evaluate a growth mindset intervention with Junior Cycle Coding and Senior Cycle Computer Science students in Ireland, where gamification will be used to incentivise growth mindset behaviour. An artificial intelligence (AI) driven personalised learning system will be developed to present computer programming learning tasks in a manner that is best suited to the individuals’ own learning preferences while incentivising and rewarding growth mindset behaviour of persistence, mastery response to challenge, and challenge seeking. This research endeavours to measure mindset with before and after surveys (conducted nationally) and by recording growth mindset behaviour whilst playing a digital game. This study will harness the capabilities of AI and aims to determine how a personalised learning (PL) experience can impact the mindset of a broad range of students. The focus of this study will be to determine how personalising the learning experience influences female and disadvantaged students' sense of belonging in the computer science classroom when tasks are presented in a manner that is best suited to the individual. Whole Brain Learning will underpin this research and will be used as a framework to guide the research in identifying key areas such as thinking and learning styles, cognitive potential, motivators and fears, and emotional intelligence. This research will be conducted in multiple school types over one academic year. Digital games will be played multiple times over this period, and the data gathered will be used to inform the AI algorithm. The three data sets are described as follows: (i) Before and after survey data to determine the grit scores and mindsets of the participants, (ii) The Growth Mind-Set data from the game, which will measure multiple growth mindset behaviours, such as persistence, response to challenge and use of strategy, (iii) The AI data to guide PL. This study will highlight the effectiveness of an AI-driven personalised learning experience. The data will position AI within the Irish educational landscape, with a specific focus on the teaching of CS. These findings will benefit coding and computer science teachers by providing a clear pedagogy for the effective delivery of personalised learning strategies for computer science education. This pedagogy will help prevent students from developing a fixed mindset while helping pupils to exhibit persistence of effort, use of strategy, and a mastery response to challenges.

Keywords: computer science education, artificial intelligence, growth mindset, pedagogy

Procedia PDF Downloads 66
2098 The Molecular Analysis of Effect of Phytohormones and Spermidine on Tomato Growth under Biotic Stress

Authors: Rumana Keyani, Haleema Sadia, Asia Nosheen, Rabia Naz, Humaira Yasmin, Sidra Zahoor

Abstract:

Tomato is a significant crop of the world and is one of the staple foods of Pakistan. A vast number of plant pathogens from simple viruses to complex parasites cause diseases in tomatoes but fungal infection in our country is quite high. Sometimes the symptoms are too harsh destroying the crop altogether. Countries like our own with continuously increasing massive population and limited resources cannot afford such an economic loss. There is an array of morphological, genetic, biochemical and molecular processes involved in plant resistance mechanisms to biotic stress. The study of different metabolic pathways like Jasmonic acid (JA) pathways and most importantly signaling molecules like ROS/RNS and their redoxin enzymes i.e. TRX and NRX is crucial to disease management, contributing to healthy plant growth. So, improving tolerance in crop plants against biotic stresses is a dire need of our country and world as whole. In the current study, fungal pathogenic strains Alternaria solani and Rhizoctonia solani were used to inoculate tomatoes to check the defense responses of tomato plant against these pathogens at molecular as well as phenotypic level with jasmonic acid and spermidine pretreatment. All the growth parameters (root and shoot length, dry and weight root, shoot weight measured 7 days post-inoculation, exhibited that infection drastically declined the growth of the plant whereas jasmonic acid and spermidine assisted the plants to cope up with the infection. Thus, JA and Spermidine treatments maintained comparatively better growth factors. Antioxidant assays and expression analysis through real time quantitative PCR following time course experiment at 24, 48 and 72 hours intervals also exhibited that activation of JA defense genes and a polyamine Spermidine helps in mediating tomato responses against fungal infection when used alone but the two treatments combined mask the effect of each other.

Keywords: fungal infection, jasmonic acid defence, tomato, spermidine

Procedia PDF Downloads 98
2097 Knowledge and Use of Computer Application Packages by Office Managers/Secretaries in Higher Institutions in Ogun State Nigeria: Implication on Performance Enhancement

Authors: Charlotte Bose Iro-Idoro, Adebisi Folake Osore, Tajudeen Adisa Jimoh

Abstract:

All changes in the office environment were and are still driven by advances in technology. The impact of computers on office work has resulted in numerous changes in office activities, procedures and the expectations from office managers and secretaries. This study investigated the level of knowledge and use of computer office application packages by secretaries and office managers in higher educational institutions in Ogun State and the implications of these on their performance enhancement. The study is an ex post facto research and adopted the survey design for the collection of data. Two hypotheses were formulated, and a questionnaire was developed and tested at 0.05 level of significance. All office managers and secretaries in the service of higher educational institutions in Ogun State, Nigeria formed the population of the study. The study was limited to federal institutions and a total of 120 office managers/secretaries were selected to form the sample such that 40 office managers/secretaries were randomly selected from each of the three Federal higher institutions in the State, that is Federal University of Agriculture, Abeokuta, Federal Polytechnic, Ilaro and Federal College of Education, Osiele, Abeokuta, Ogun State. Analysis of data and hypotheses tests were carried out with frequency counts, percentage and T-Test. The result indicated varying levels of awareness on office application tools with limited knowledge and use of computer application packages by office managers/secretaries. The results also showed that good knowledge and high use of office application tools enhance performance of office managers/secretaries. The study recommended that there should be maximum institutional resources and support and personal development on the part of the office managers to ensure update knowledge and maximal use of office application tools by office managers/secretaries.

Keywords: application packages, computer, office managers, performance enhancement

Procedia PDF Downloads 143
2096 The Use of Gender-Fair Language in CS National Exams

Authors: Moshe Leiba, Doron Zohar

Abstract:

Computer Science (CS) and programming is still considered a boy’s club and is a male-dominated profession. This is also the case in high schools and higher education. In Israel, not different from the rest of the world, there are less than 35% of female students in CS studies that take the matriculation exams. The Israeli matriculation exams are written in a masculine form language. Gender-fair language (GFL) aims at reducing gender stereotyping and discrimination. There are several strategies that can be employed to make languages gender-fair and to treat women and men symmetrically (especially in languages with grammatical gender, among them neutralization and using the plural form. This research aims at exploring computer science teachers’ beliefs regarding the use of gender-fair language in exams. An exploratory quantitative research methodology was employed to collect the data. A questionnaire was administered to 353 computer science teachers. 58% female and 42% male. 86% are teaching for at least 3 years, with 59% of them have a teaching experience of 7 years. 71% of the teachers teach in high school, and 82% of them are preparing students for the matriculation exam in computer science. The questionnaire contained 2 matriculation exam questions from previous years and open-ended questions. Teachers were asked which form they think is more suited: (a) the existing form (mescaline), (b) using both gender full forms (e.g., he/she), (c) using both gender short forms, (d) plural form, (e) natural form, and (f) female form. 84% of the teachers recognized the need to change the existing mescaline form in the matriculation exams. About 50% of them thought that using the plural form was the best-suited option. When examining the teachers who are pro-change and those who are against, no gender differences or teaching experience were found. The teachers who are pro gender-fair language justified it as making it more personal and motivating for the female students. Those who thought that the mescaline form should remain argued that the female students do not complain and the change in form will not influence or affect the female students to choose to study computer science. Some even argued that the change will not affect the students but can only improve their sense of identity or feeling toward the profession (which seems like a misconception). This research suggests that the teachers are pro-change and believe that re-formulating the matriculation exams is the right step towards encouraging more female students to choose to study computer science as their major study track and to bridge the gap for gender equality. This should indicate a bottom-up approach, as not long after this research was conducted, the Israeli ministry of education decided to change the matriculation exams to gender-fair language using the plural form. In the coming years, with the transition to web-based examination, it is suggested to use personalization and adjust the language form in accordance with the student's gender.

Keywords: compter science, gender-fair language, teachers, national exams

Procedia PDF Downloads 87
2095 Authentication and Legal Admissibility of 'Computer Evidence from Electronic Voting Machines' in Electoral Litigation: A Qualitative Legal Analysis of Judicial Opinions of Appellate Courts in the USA

Authors: Felix O. Omosele

Abstract:

Several studies have established that electronic voting machines are prone to multi-faceted challenges. One of which is their capacity to lose votes after the ballots might have been cast. Therefore, the international consensus appears to favour the use of electronic voting machines that are accompanied with verifiable audit paper audit trail (VVPAT). At present, there is no known study that has evaluated the impacts (or otherwise) of this verification and auditing on the authentication, admissibility and evidential weight of electronically-obtained electoral data. This legal inquiry is important as elections are sometimes won or lost in courts and on the basis of such data. This gap will be filled by the present research work. Using the United States of America as a case study, this paper employed a qualitative legal analysis of several of its appellate courts’ judicial opinions. This analysis equally unearths the necessary statutory rules and regulations that are important to the research problem. The objective of the research is to highlight the roles played by VVPAT on electoral evidence- as seen from the eyes of the court. The preliminary outcome of this qualitative analysis shows that the admissibility and weight attached to ‘Computer Evidence from e-voting machines (CEEM)’ are often treated with general standards applied to other computer-stored evidence. These standards sometimes fail to embrace the peculiar challenges faced by CEEM, particularly with respect to their tabulation and transmission. This paper, therefore, argues that CEEM should be accorded unique consideration by courts. It proposes the development of a legal standard which recognises verification and auditing as ‘weight enhancers’ for electronically-obtained electoral data.

Keywords: admissibility of computer evidence, electronic voting, qualitative legal analysis, voting machines in the USA

Procedia PDF Downloads 170
2094 Synchronous Courses Attendance in Distance Higher Education: Case Study of a Computer Science Department

Authors: Thierry Eude

Abstract:

The use of videoconferencing platforms adapted to teaching offers students the opportunity to take distance education courses in much the same way as traditional in-class training. The sessions can be recorded and they allow students the option of following the courses synchronously or asynchronously. Three typical profiles can then be distinguished: students who choose to follow the courses synchronously, students who could attend the course in synchronous mode but choose to follow the session off-line, and students who follow the course asynchronously as they cannot attend the course when it is offered because of professional or personal constraints. Our study consists of observing attendance at all distance education courses offered in the synchronous mode by the Computer Science and Software Engineering Department at Laval University during 10 consecutive semesters. The aim is to identify factors that influence students in their choice of attending the distance courses in synchronous mode. It was found that participation tends to be relatively stable over the years for any one semester (fall, winter summer) and is similar from one course to another, although students may be increasingly familiar with the synchronous distance education courses. Average participation is around 28%. There may be deviations, but they concern only a few courses during certain semesters, suggesting that these deviations would only have occurred because of the composition of particular promotions during specific semesters. Furthermore, course schedules have a great influence on the attendance rate. The highest rates are all for courses which are scheduled outside office hours.

Keywords: attendance, distance undergraduate education in computer science, student behavior, synchronous e-learning

Procedia PDF Downloads 265
2093 Early Transcriptome Responses to Piscine orthoreovirus-1 in Atlantic salmon Erythrocytes Compared to Salmonid Kidney Cell Lines

Authors: Thomais Tsoulia, Arvind Y. M. Sundaram, Stine Braaen, Øyvind Haugland, Espen Rimstad, Øystein Wessel, Maria K. Dahle

Abstract:

Fish red blood cells (RBC) are nucleated, and in addition to their function in gas exchange, they have been characterized as mediators of immune responses. Salmonid RBC are the major target cells of Piscineorthoreovirus (PRV), a virus associated with heart and skeletal muscle inflammation (HSMI) in farmed Atlantic salmon. The activation of antiviral response genesin RBChas previously been described in ex vivo and in vivo PRV-infection models, but not explored in the initial virus encounter phase. In the present study, mRNA transcriptome responses were explored in erythrocytes from individual fish, kept ex vivo, and exposed to purified PRV for 24 hours. The responses were compared to responses in macrophage-like salmon head kidney (SHK-1) and endothelial-like Atlantic salmon kidney (ASK) cells, none of which support PRV replication. The comparative analysis showed that the antiviral response to PRV was strongest in the SHK-1 cells, with a set of 80 significantly induced genes (≥ 2-fold upregulation). In RBC, 46 genes were significantly upregulated, while ASK cells were not significantly responsive. In particular, the transcriptome analysis of RBC revealed that PRV significantly induced interferon regulatory factor 1 (IRF1) and interferon-induced protein with tetratricopeptide repeats 5-like (IFIT9). However, several interferon-regulated antiviral genes which have previously been reported upregulated in PRV infected RBC in vivo (myxovirus resistance (Mx), interferon-stimulated gene 15 (ISG15), toll-like receptor 3 (TLR3)), were not significantly induced after 24h of virus stimulation. In contrast to RBC, these antiviral response genes were significantly upregulated in SHK-1. These results confirm that RBC are involved in the innate immune response to viruses, but with a delayed antiviral response compared to SHK-1. A notable difference is that interferon regulatory factor 1 (IRF-1) is the most strongly induced gene in RBC, but not among the significantly induced genes in SHK-1. Putative differences in the binding, recognition, and response to PRV, and any link to effects on the ability of PRV to replicate remains to be explored.

Keywords: antiviral responses, atlantic salmon, piscine orthoreovirus-1, red blood cells, RNA-seq

Procedia PDF Downloads 160
2092 Effectiveness of Computer Video Games on the Levels of Anxiety of Children Scheduled for Tooth Extraction

Authors: Marji Umil, Miane Karyle Urolaza, Ian Winston Dale Uy, John Charle Magne Valdez, Karen Elizabeth Valdez, Ervin Charles Valencia, Cheryleen Tan-Chua

Abstract:

Objective: Distraction techniques can be successful in reducing the anxiety of children during medical procedures. Dental procedures, in particular, are associated with dental anxiety which has been identified as a significant and common problem in children, however, only limited studies were conducted to address such problem. Thus, this study determined the effectiveness of computer video games on the levels of anxiety of children between 5-12 years old scheduled for tooth extraction. Methods: A pre-test post-test quasi-experimental study was conducted involving 30 randomly-assigned subjects, 15 in the experimental and 15 in the control. Subjects in the experimental group played computer video games for a maximum of 15 minutes, however, no intervention was done on the control. The modified Yale Pre-operative Anxiety Scale (m-YPAS) with a Cronbach’s alpha of 0.9 was used to assess anxiety at two different points: upon arrival in the clinic (pre-test anxiety) and 15 minutes after the first measurement (post-test anxiety). Paired t-test and ANCOVA were used to analyze the gathered data. Results: Results showed that there is a significant difference between the pre-test and post-test anxiety scores of the control group (p=0.0002) which indicates an increased anxiety. A significant difference was also noted between the pre-test and post-test anxiety scores of the experimental group (p=0.0002) which indicates decreased anxiety. Comparatively, the experimental group showed lower anxiety score (p=<0.0001) than the control. Conclusion: The use of computer video games is effective in reducing the pre-operative anxiety among children and can be an alternative non-pharmacological management in giving pre-operative care.

Keywords: play therapy, preoperative anxiety, tooth extraction, video games

Procedia PDF Downloads 424
2091 Prevalence of Seropositivity for Cytomegalovirus in Patients with Hereditary Bleeding Diseases in West Azerbaijan of Iran

Authors: Zakieh Rostamzadeh, Zahra Shirmohammadi

Abstract:

Human cytomegalovirus is a species of the cytomegalovirus family of viruses, which in turn is a member of the viral family known as herpesviridae or herpesviruses. Although they may be found throughout the body, HCMV infections are frequently associated with the salivary glands. HCMV infection is typically unnoticed in healthy people, but can be life-threatening for the immunocompromised such as HIV-infected persons, organ transplant recipients, or newborn infants. After infection, HCMV has an ability to remain latent within the body over long periods. Cytomegalovirus (CMV) causes infection in immunocompromised, hemophilia patients and those who received blood transfusion frequently. This study aimed at determining the prevalence of cytomegalovirus (CMV) antibodies in hemophilia patients. Materials and Methods: A retrospective observational study was carried out in Urmia, North West of Iran. The study population comprised a sample of 50 hemophilic patients born after 1985 and have received blood factors in West Azerbaijan. The exclusion criteria include: drug abusing, high risk sexual contacts, vertical transmission of mother to fetus and suspicious needling. All samples were evaluated with the method of ELISA, with a certain kind of kit and by a certain laboratory. Results: Fifty hemophiliacs from 250 patients registered with Urmia Hemophilia Society were enrolled in the study including 43 (86%) male, and 7 (14%) female. The mean age of patients was 10.3 years, range 3 to 25 years. None of patients had risk factors mentioned above. Among our studied population, 34(68%) had hemophilia A, 1 (2%) hemophilia B, 8 (16%) VWF, 3(6%) factor VII deficiency, 1 (2%) factor V deficiency, 1 (2%) factor X deficiency, 1 (2%). Sera of 50 Hemodialysis patients were investigated for CMV-specific immunoglobulin G (IgG) and IgM. % 91.89 patients were anti-CMV IgG positive and %40.54 was seropositive for anti-CMV IgM. 37.8% patient had serological evidence of reactivation and 2.7% of patients had the primary infection. Discussion: There was no relationship between the antibody titer and: drug abusing, high risk sexual contacts, vertical transmission of mother to fetus and suspicious needling.

Keywords: bioinformatics, biomedicine, cytomegalovirus, immunocompromise

Procedia PDF Downloads 332
2090 Enhancing Animal Protection: Topical RNAi with Polymer Carriers for Sustainable Animal Health in Australian Sheep Flystrike

Authors: Yunjia Yang, Yakun Yan, Peng Li, Gordon Xu, Timothy Mahony, Neena Mitter, Karishma Mody

Abstract:

Sheep flystrike is one of the most economically important diseases affecting the Australian sheep and wool industry (>356M/annually). Currently, control of Lucillia cuprina relies almost exclusively on chemicals controls and the parasite has developed resistance to nearly all control chemicals used in the past. It is therefore critical to develop an alternative solution for the sustainable control and management of flystrike. RNA interference (RNAi) technologies have been successfully explored in multiple animal industries for developing parasites controls. This research project aims to develop a RNAi based biological control for sheep blowfly. Double-stranded RNA (dsRNA) has already proven successful against viruses, fungi and insects. However, the environmental instability of dsRNA is a major bottleneck with a protection window only lasting 5-7 days. Bentonite polymer (BenPol) technology can overcome this problem, as it can be tuned for controlled release of the dsRNA in the gut challenging pH environment of the blowfly larvae, prolonging its exposure time to and uptake by target cells. We have investigated four different BenPol carriers for their dsRNA loading capabilities of which three of them were able to afford dsRNA stability under multiple temperatures (4°C, 22°C, 40°C, 55°C) in the sheep serum. Based on stability results, we further tested dsRNA from potential targeted genes loaded with BenPol carrier in larvae feeding assay, and get three knockdowns. Our results, establish that the dsRNA when loaded on BenPol particles is stable unlike naked dsRNA which is rapidly degraded in the sheep serum. A stable nanoparticles delivery system that can protect and increase the inherent stability of the dsRNA molecules at higher temperatures in a complex biological fluid like serum, offers a great deal of promise for the future use of this approach for enhancing animal protection.

Keywords: RNA interference, Lucillia cuprina, polymer carriers, polymer stability

Procedia PDF Downloads 53
2089 Munting Kamay, Munting Gawa: Children's Development Training, a UCU Experience

Authors: Elizabeth A. Montero

Abstract:

The project contemplated in this study particularly aimed at enabling public school children of ages ten to twelve who belong to low and middle income families. The pupils were provided training on communication, work, computer and social skills. In this study, the researcher hypothesized that children given the opportunity to develop a skill through guidance and proper supervision will significantly learn, improve and develop a skill. Since children’s minds are highly absorbent like a sponge absorbing anything within its capacity to take, it is ideal and necessary that education should provide an environment that is rich offering an array of meaningful experiences. The context of this study is well balanced since it catered to the children’s communication, work, computer and social skills.

Keywords: Munting Kamay, Munting Gawa, children’s development training, UCU experience

Procedia PDF Downloads 407
2088 Diagnosis and Analysis of Automated Liver and Tumor Segmentation on CT

Authors: R. R. Ramsheeja, R. Sreeraj

Abstract:

For view the internal structures of the human body such as liver, brain, kidney etc have a wide range of different modalities for medical images are provided nowadays. Computer Tomography is one of the most significant medical image modalities. In this paper use CT liver images for study the use of automatic computer aided techniques to calculate the volume of the liver tumor. Segmentation method is used for the detection of tumor from the CT scan is proposed. Gaussian filter is used for denoising the liver image and Adaptive Thresholding algorithm is used for segmentation. Multiple Region Of Interest(ROI) based method that may help to characteristic the feature different. It provides a significant impact on classification performance. Due to the characteristic of liver tumor lesion, inherent difficulties appear selective. For a better performance, a novel proposed system is introduced. Multiple ROI based feature selection and classification are performed. In order to obtain of relevant features for Support Vector Machine(SVM) classifier is important for better generalization performance. The proposed system helps to improve the better classification performance, reason in which we can see a significant reduction of features is used. The diagnosis of liver cancer from the computer tomography images is very difficult in nature. Early detection of liver tumor is very helpful to save the human life.

Keywords: computed tomography (CT), multiple region of interest(ROI), feature values, segmentation, SVM classification

Procedia PDF Downloads 488
2087 The Protection of Artificial Intelligence (AI)-Generated Creative Works Through Authorship: A Comparative Analysis Between the UK and Nigerian Copyright Experience to Determine Lessons to Be Learnt from the UK

Authors: Esther Ekundayo

Abstract:

The nature of AI-generated works makes it difficult to identify an author. Although, some scholars have suggested that all the players involved in its creation should be allocated authorship according to their respective contribution. From the programmer who creates and designs the AI to the investor who finances the AI and to the user of the AI who most likely ends up creating the work in question. While others suggested that this issue may be resolved by the UK computer-generated works (CGW) provision under Section 9(3) of the Copyright Designs and Patents Act 1988. However, under the UK and Nigerian copyright law, only human-created works are recognised. This is usually assessed based on their originality. This simply means that the work must have been created as a result of its author’s creative and intellectual abilities and not copied. Such works are literary, dramatic, musical and artistic works and are those that have recently been a topic of discussion with regards to generative artificial intelligence (Generative AI). Unlike Nigeria, the UK CDPA recognises computer-generated works and vests its authorship with the human who made the necessary arrangement for its creation . However, making necessary arrangement in the case of Nova Productions Ltd v Mazooma Games Ltd was interpreted similarly to the traditional authorship principle, which requires the skills of the creator to prove originality. Although, some recommend that computer-generated works complicates this issue, and AI-generated works should enter the public domain as authorship cannot be allocated to AI itself. Additionally, the UKIPO recognising these issues in line with the growing AI trend in a public consultation launched in the year 2022, considered whether computer-generated works should be protected at all and why. If not, whether a new right with a different scope and term of protection should be introduced. However, it concluded that the issue of computer-generated works would be revisited as AI was still in its early stages. Conversely, due to the recent developments in this area with regards to Generative AI systems such as ChatGPT, Midjourney, DALL-E and AIVA, amongst others, which can produce human-like copyright creations, it is therefore important to examine the relevant issues which have the possibility of altering traditional copyright principles as we know it. Considering that the UK and Nigeria are both common law jurisdictions but with slightly differing approaches to this area, this research, therefore, seeks to answer the following questions by comparative analysis: 1)Who is the author of an AI-generated work? 2)Is the UK’s CGW provision worthy of emulation by the Nigerian law? 3) Would a sui generis law be capable of protecting AI-generated works and its author under both jurisdictions? This research further examines the possible barriers to the implementation of the new law in Nigeria, such as limited technical expertise and lack of awareness by the policymakers, amongst others.

Keywords: authorship, artificial intelligence (AI), generative ai, computer-generated works, copyright, technology

Procedia PDF Downloads 58
2086 Stochastic Simulation of Random Numbers Using Linear Congruential Method

Authors: Melvin Ballera, Aldrich Olivar, Mary Soriano

Abstract:

Digital computers nowadays must be able to have a utility that is capable of generating random numbers. Usually, computer-generated random numbers are not random given predefined values such as starting point and end points, making the sequence almost predictable. There are many applications of random numbers such business simulation, manufacturing, services domain, entertainment sector and other equally areas making worthwhile to design a unique method and to allow unpredictable random numbers. Applying stochastic simulation using linear congruential algorithm, it shows that as it increases the numbers of the seed and range the number randomly produced or selected by the computer becomes unique. If this implemented in an environment where random numbers are very much needed, the reliability of the random number is guaranteed.

Keywords: stochastic simulation, random numbers, linear congruential algorithm, pseudorandomness

Procedia PDF Downloads 288
2085 Evaluation and Assessment of Bioinformatics Methods and Their Applications

Authors: Fatemeh Nokhodchi Bonab

Abstract:

Bioinformatics, in its broad sense, involves application of computer processes to solve biological problems. A wide range of computational tools are needed to effectively and efficiently process large amounts of data being generated as a result of recent technological innovations in biology and medicine. A number of computational tools have been developed or adapted to deal with the experimental riches of complex and multivariate data and transition from data collection to information or knowledge. These bioinformatics tools are being evaluated and applied in various medical areas including early detection, risk assessment, classification, and prognosis of cancer. The goal of these efforts is to develop and identify bioinformatics methods with optimal sensitivity, specificity, and predictive capabilities. The recent flood of data from genome sequences and functional genomics has given rise to new field, bioinformatics, which combines elements of biology and computer science. Bioinformatics is conceptualizing biology in terms of macromolecules (in the sense of physical-chemistry) and then applying "informatics" techniques (derived from disciplines such as applied maths, computer science, and statistics) to understand and organize the information associated with these molecules, on a large-scale. Here we propose a definition for this new field and review some of the research that is being pursued, particularly in relation to transcriptional regulatory systems.

Keywords: methods, applications, transcriptional regulatory systems, techniques

Procedia PDF Downloads 99
2084 Reduction of the Cellular Infectivity of SARS-CoV-2 by a Mucoadhesive Nasal Spray

Authors: Adam M. Pitz, Gillian L. Phillipson, Jayant E. Khanolkar, Andrew M. Middleton

Abstract:

New emerging evidence suggests that the nose is the predominant route for entry of the SARS-CoV-2 virus into the host. A virucidal suspension test (conforming in principle to the European Standard EN14476) was conducted to determine whether a commercial liquid gel intranasal spray containing 1% of the mucoadhesive hydroxypropyl methylcellulose (HPMC) could inhibit the cellular infectivity of the SARS-CoV-2 coronavirus. Virus was added to the test product samples and to controls in a 1:8 ratio and mixed with one part bovine serum albumin as an interfering substance. The test samples were pre-equilibrated to 34 ± 2°C (representing the temperature of the nasopharynx) with the temperature maintained at 34 ± 2°C for virus contact times of 1, 5 and 10 minutes. Neutralized aliquots were inoculated onto host cells (Vero E6 cells, ATCC CRL-1586). The host cells were then incubated at 36 ± 2°C for a period of 7 days. The residual infectious virus in both test and controls was detected by viral-induced cytopathic effect. The 50% tissue culture infective dose per mL (TCID50/mL) was determined using the Spearman-Karber method with results reported as the reduction of the virus titer due to treatment with test product, expressed as log10. The controls confirmed the validity of the results with no cytotoxicity or viral interference observed in the neutralized test product samples. The HPMC formulation reduced SARS-CoV-2 titer, expressed as log10TCID50, by 2.30 ( ± 0.17), 2.60 ( ± 0.19), and 3.88 ( ± 0.19) with the respective contact times of 1, 5 and 10 minutes. The results demonstrate that this 1% HPMC gel formulation can reduce the cellular infectivity of the SARS-CoV-2 virus with an increasing viral inhibition observed with increasing exposure time. This 1% HMPC gel is well tolerated and can reside, when delivered via nasal spray, for up to one hour in the nasal cavity. We conclude that this intranasal gel spray with 1% HPMC repeat-dosed every few hours may offer an effective preventive or early intervention solution to limit the transmission and impact of the SARS-CoV-2 coronavirus.

Keywords: hydroxypropyl methylcellulose, mucoadhesive nasal spray, respiratory viruses, SARS-CoV-2

Procedia PDF Downloads 112
2083 On Some Properties of Maximal Prefix Codes

Authors: Nikolai Krainiukov, Boris Melnikov

Abstract:

We study the properties of maximal prefix codes. The codes have many applications in computer science, theory of formal languages, data processing and data classification. Practical application is based on the representation of the maximal prefix codes as a sequence of words in a specific order. Our approach to study uses finite state automata (so-called flower automata) for the representation of prefix codes. An important task is the decomposition of prefix codes into prime prefix codes (factors). We discuss the properties of such prefix code decompositions. A linear time algorithm is designed which find the prime decomposition. To verify the correctness of the proposed algorithms, we implemented a system computer algebra GAP.

Keywords: maximal prefix code, regular languages, flower automata, prefix code decomposing

Procedia PDF Downloads 50
2082 Induction Heating Process Design Using Comsol® Multiphysics Software Version 4.2a

Authors: K. Djellabi, M. E. H. Latreche

Abstract:

Induction heating computer simulation is a powerful tool for process design and optimization, induction coil design, equipment selection, as well as education and business presentations. The authors share their vast experience in the practical use of computer simulation for different induction heating and heat treating processes. In this paper deals with mathematical modeling and numerical simulation of induction heating furnaces with axisymmetric geometries. For the numerical solution, we propose finite element methods combined with boundary (FEM) for the electromagnetic model using COMSOL® Multiphysics Software. Some numerical results for an industrial furnace are shown with high frequency.

Keywords: numerical methods, induction furnaces, induction heating, finite element method, Comsol multiphysics software

Procedia PDF Downloads 415
2081 Time-Domain Simulations of the Coupled Dynamics of Surface Riding Wave Energy Converter

Authors: Chungkuk Jin, Moo-Hyun Kim, HeonYong Kang

Abstract:

A surface riding (SR) wave energy converter (WEC) is designed and its feasibility and performance are numerically simulated by the author-developed floater-mooring-magnet-electromagnetics fully-coupled dynamic analysis computer program. The biggest advantage of the SR-WEC is that the performance is equally effective even in low sea states and its structural robustness is greatly improved by simply riding along the wave surface compared to other existing WECs. By the numerical simulations and actuator testing, it is clearly demonstrated that the concept works and through the optimization process, its efficiency can be improved.

Keywords: computer simulation, electromagnetics fully-coupled dynamics, floater-mooring-magnet, optimization, performance evaluation, surface riding, WEC

Procedia PDF Downloads 116
2080 Analysis of The Effect about Different Automatic Sprinkler System Extinguishing The Scooter Fire in Underground Parking Space

Authors: Yu-Hsiu Li, Chun-Hsun Chen

Abstract:

Analysis of automatic sprinkler system protects the scooter in underground parking space, the current of general buildings is mainly equipped with foam fire-extinguishing equipment in Taiwan, the automatic sprinkling system has economic and environmental benefits, even high stability, China and the United States allow the parking space to set the automatic sprinkler system under certain conditions. The literature about scooter full-scale fire indicates that the average fire growth coefficient is 0.19 KW/sec2, it represents the scooter fire is classified as ultra-fast time square fire growth model, automatic sprinkler system can suppress the flame height and prevent extending burning. According to the computer simulation (FDS) literature, no matter computer simulation or full-scale experiments, the active order and trend about sprinkler heads are the same. This study uses the computer simulation program (FDS), the simulation scenario designed includes using a different system (enclosed wet type and open type), and different configurations. The simulation result demonstrates that the open type requires less time to extinguish the fire than the enclosed wet type if the horizontal distance between the sprinkler and the scooter ignition source is short, the sprinkler can act quickly, the heat release rate of fire can be suppressed in advance.

Keywords: automatic sprinkler system, underground parking Spac, FDS, scooter fire extinguishing

Procedia PDF Downloads 117
2079 Hand Motion and Gesture Control of Laboratory Test Equipment Using the Leap Motion Controller

Authors: Ian A. Grout

Abstract:

In this paper, the design and development of a system to provide hand motion and gesture control of laboratory test equipment is considered and discussed. The Leap Motion controller is used to provide an input to control a laboratory power supply as part of an electronic circuit experiment. By suitable hand motions and gestures, control of the power supply is provided remotely and without the need to physically touch the equipment used. As such, it provides an alternative manner in which to control electronic equipment via a PC and is considered here within the field of human computer interaction (HCI).

Keywords: control, hand gesture, human computer interaction, test equipment

Procedia PDF Downloads 294
2078 Urban Rail Transit CBTC Computer Interlocking Subsystem Relying on Multi-Template Pen Point Tracking Algorithm

Authors: Xinli Chen, Xue Su

Abstract:

In the urban rail transit CBTC system, interlocking is considered one of the most basic sys-tems, which has the characteristics of logical complexity and high-security requirements. The development and verification of traditional interlocking subsystems are entirely manual pro-cesses and rely too much on the designer, which often hides many uncertain factors. In order to solve this problem, this article is based on the multi-template nib tracking algorithm for model construction and verification, achieving the main safety attributes and using SCADE for formal verification. Experimental results show that this method helps to improve the quality and efficiency of interlocking software.

Keywords: computer interlocking subsystem, penpoint tracking, communication-based train control system, multi-template tip tracking

Procedia PDF Downloads 138
2077 An Affordability Evaluation of Computer-Based Social-Emotional Skills Interventions for School-Aged Children with Autism Spectrum Disorder

Authors: Ezra N. S. Lockhart

Abstract:

The number of children diagnosed with autism spectrum disorder (ASD) has increased approximately 173% during the last decade making ASD the fastest growing developmental disability in the United States. This rise in prevalence rates indeed has an effect on schools. ASD is overwhelmingly the most reported primary special education eligibility category for students accessing special education, at a national average of 61.3%. ASD is regarded as an urgent public health concern at an estimated annual per capita cost of $3.2 million. Furthermore, considering that ASD is a lifelong disorder estimated lifetime per capita cost reach $35 billion. The resources available to special education programs are insufficient to meet the educational needs of the 6.4 million students receiving special educational services. This is especially true given that there has been and continues to be a chronic shortage of fully certified special education teachers for decades. Reports indicate that 81.1% of students with special needs spend 40% or more in general education classrooms. Regardless of whether support is implemented in the special education or general education classroom the resource demand is obvious. Schools are actively seeking to implement low-cost alternatives and budget saving measures in response to this demand. In public school settings, programs such as Applied Behavior Analysis are challenging to implement and fund at $40,000 per student per year. As an alternative, computer-based interventions are inexpensive, less time-consuming to implement, and require minimal teacher or paraprofessional training to administer. Affordability, pricing schemes, availability, and compatibility of computer-based interventions that support social and emotional skill development in individuals with ASD are discussed.

Keywords: affordability, autism spectrum disorder, computer-based intervention, emotional skills, social skills

Procedia PDF Downloads 138
2076 Using Computer Vision to Detect and Localize Fractures in Wrist X-ray Images

Authors: John Paul Q. Tomas, Mark Wilson L. de los Reyes, Kirsten Joyce P. Vasquez

Abstract:

The most frequent type of fracture is a wrist fracture, which often makes it difficult for medical professionals to find and locate. In this study, fractures in wrist x-ray pictures were located and identified using deep learning and computer vision. The researchers used image filtering, masking, morphological operations, and data augmentation for the image preprocessing and trained the RetinaNet and Faster R-CNN models with ResNet50 backbones and Adam optimizers separately for each image filtering technique and projection. The RetinaNet model with Anisotropic Diffusion Smoothing filter trained with 50 epochs has obtained the greatest accuracy of 99.14%, precision of 100%, sensitivity/recall of 98.41%, specificity of 100%, and an IoU score of 56.44% for the Posteroanterior projection utilizing augmented data. For the Lateral projection using augmented data, the RetinaNet model with an Anisotropic Diffusion filter trained with 50 epochs has produced the highest accuracy of 98.40%, precision of 98.36%, sensitivity/recall of 98.36%, specificity of 98.43%, and an IoU score of 58.69%. When comparing the test results of the different individual projections, models, and image filtering techniques, the Anisotropic Diffusion filter trained with 50 epochs has produced the best classification and regression scores for both projections.

Keywords: Artificial Intelligence, Computer Vision, Wrist Fracture, Deep Learning

Procedia PDF Downloads 52
2075 Static and Dynamic Hand Gesture Recognition Using Convolutional Neural Network Models

Authors: Keyi Wang

Abstract:

Similar to the touchscreen, hand gesture based human-computer interaction (HCI) is a technology that could allow people to perform a variety of tasks faster and more conveniently. This paper proposes a training method of an image-based hand gesture image and video clip recognition system using a CNN (Convolutional Neural Network) with a dataset. A dataset containing 6 hand gesture images is used to train a 2D CNN model. ~98% accuracy is achieved. Furthermore, a 3D CNN model is trained on a dataset containing 4 hand gesture video clips resulting in ~83% accuracy. It is demonstrated that a Cozmo robot loaded with pre-trained models is able to recognize static and dynamic hand gestures.

Keywords: deep learning, hand gesture recognition, computer vision, image processing

Procedia PDF Downloads 114
2074 Metal Ship and Robotic Car: A Hands-On Activity to Develop Scientific and Engineering Skills for High School Students

Authors: Jutharat Sunprasert, Ekapong Hirunsirisawat, Narongrit Waraporn, Somporn Peansukmanee

Abstract:

Metal Ship and Robotic Car is one of the hands-on activities in the course, the Fundamental of Engineering that can be divided into three parts. The first part, the metal ships, was made by using engineering drawings, physics and mathematics knowledge. The second part is where the students learned how to construct a robotic car and control it using computer programming. In the last part, the students had to combine the workings of these two objects in the final testing. This aim of study was to investigate the effectiveness of hands-on activity by integrating Science, Technology, Engineering and Mathematics (STEM) concepts to develop scientific and engineering skills. The results showed that the majority of students felt this hands-on activity lead to an increased confidence level in the integration of STEM. Moreover, 48% of all students engaged well with the STEM concepts. Students could obtain the knowledge of STEM through hands-on activities with the topics science and mathematics, engineering drawing, engineering workshop and computer programming; most students agree and strongly agree with this learning process. This indicated that the hands-on activity: “Metal Ship and Robotic Car” is a useful tool to integrate each aspect of STEM. Furthermore, hands-on activities positively influence a student’s interest which leads to increased learning achievement and also in developing scientific and engineering skills.

Keywords: hands-on activity, STEM education, computer programming, metal work

Procedia PDF Downloads 438
2073 A Comparison of Energy Calculations for a Single-Family Detached Home with Two Energy Simulation Methods

Authors: Amir Sattari

Abstract:

For newly produced houses and energy renovations, an energy calculation needs to be conducted. This is done to verify whether the energy consumption criteria of the house -to reach the energy targets by 2020 and 2050- are in-line with the norms. The main purpose of this study is to confirm whether easy to use energy calculation software or hand calculations used by small companies or individuals give logical results compared to advanced energy simulation program used by researchers or bigger companies. There are different methods for calculating energy consumption. In this paper, two energy calculation programs are used and the relation of energy consumption with solar radiation is compared. A hand calculation is also done to validate whether the hand calculations are still reasonable. The two computer programs which have been used are TMF Energi (the easy energy calculation variant used by small companies or individuals) and IDA ICE - Indoor Climate and Energy (the advanced energy simulation program used by researchers or larger companies). The calculations are done for a standard house from the Swedish house supplier Fiskarhedenvillan. The method is based on having the same conditions and inputs in the different calculation forms so that the results can be compared and verified. The house has been faced differently to see how the orientation affects energy consumption in different methods. The results for the simulations are close to each other and the hand calculation differs from the computer programs by only 5%. Even if solar factors differ due to the orientation of the house, energy calculation results from different computer programs and even hand calculation methods are in line with each other.

Keywords: energy calculation, energy consumption, energy simulation, IDA ICE, TMF energi

Procedia PDF Downloads 96